Skip to main content

CVE-2022-42756: CWE-120 Classic Buffer Overflow in Unisoc (Shanghai) Technologies Co., Ltd. SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000

High
Published: Tue Dec 06 2022 (12/06/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: Unisoc (Shanghai) Technologies Co., Ltd.
Product: SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000

Description

In sensor driver, there is a possible buffer overflow due to a missing bounds check. This could lead to local denial of service in kernel.

AI-Powered Analysis

AILast updated: 06/21/2025, 23:39:35 UTC

Technical Analysis

CVE-2022-42756 is a high-severity vulnerability identified in several Unisoc (Shanghai) Technologies Co., Ltd. chipsets, including SC9863A, SC9832E, SC7731E, and multiple T-series models (T610, T310, T606, T760, T618, T612, T616, T770, T820, S8000). The vulnerability stems from a classic buffer overflow (CWE-120) in the sensor driver component of these chipsets. Specifically, the flaw arises due to a missing bounds check when handling input data, which allows an attacker with local access to overflow a buffer in kernel space. This overflow can corrupt memory, leading to a denial of service (DoS) condition by crashing the kernel or causing instability. The vulnerability affects devices running Android versions 10, 11, and 12 that incorporate these Unisoc chipsets. The CVSS v3.1 base score is 7.7, indicating high severity, with the vector AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H. This means the attack requires local access (local vector), low attack complexity, no privileges required, no user interaction, and impacts integrity and availability but not confidentiality. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability is significant because kernel-level buffer overflows can lead to system crashes or potentially be leveraged for privilege escalation or code execution, although this CVE specifically notes denial of service as the primary impact. The affected chipsets are commonly used in budget and mid-range smartphones, particularly in markets where Unisoc processors are prevalent. The sensor driver is a critical component interacting with hardware sensors, so exploitation could disrupt device functionality or stability.

Potential Impact

For European organizations, the primary impact of CVE-2022-42756 is the potential for local denial of service on devices using affected Unisoc chipsets running Android 10-12. This could lead to device crashes, instability, or forced reboots, impacting mobile workforce productivity and device reliability. While the vulnerability does not directly compromise confidentiality, the loss of integrity and availability at the kernel level can disrupt critical mobile applications, including secure communications, authentication apps, or enterprise mobile device management (MDM) solutions. Organizations relying on mobile devices with these chipsets for secure access to corporate resources may face operational disruptions. Additionally, if exploited in targeted attacks, this vulnerability could be used as a stepping stone for further local privilege escalation or persistence, although no such exploits are currently known. The impact is more pronounced in sectors with high mobile device usage and sensitive data handling, such as finance, healthcare, and government agencies. Since Unisoc chipsets are more common in lower-cost devices, organizations with BYOD policies or employees using such devices may be more exposed. The lack of patches increases the risk window, emphasizing the need for mitigation. Overall, the threat could degrade device availability and reliability, indirectly affecting business continuity and security posture.

Mitigation Recommendations

1. Inventory and Identification: Organizations should identify mobile devices in use that incorporate Unisoc chipsets listed in the CVE and run Android 10, 11, or 12. This can be done via MDM solutions or device management inventories. 2. Restrict Local Access: Since exploitation requires local access, enforce strict physical security controls and device usage policies to prevent unauthorized access to employee devices. 3. Limit Installation of Untrusted Apps: Use enterprise app stores and restrict installation of apps from unknown sources to reduce the risk of malicious apps triggering the vulnerability. 4. Monitor Device Stability: Implement monitoring for unusual device crashes or reboots that could indicate exploitation attempts. 5. Firmware and OS Updates: Engage with device vendors and Unisoc to obtain patches or firmware updates as they become available. Promptly apply updates once released. 6. Use Endpoint Protection: Deploy mobile endpoint protection platforms capable of detecting anomalous behavior or kernel-level exploits. 7. User Awareness: Educate users about the risks of local exploitation and the importance of not connecting devices to untrusted computers or networks. 8. Network Segmentation: Limit the access of mobile devices to sensitive internal networks unless they meet security compliance, reducing the impact of compromised devices. 9. Incident Response Preparedness: Prepare for potential denial of service incidents by having backup communication methods and device replacement strategies. These mitigations go beyond generic advice by focusing on local access control, device inventory specific to Unisoc chipsets, and proactive monitoring tailored to the nature of this kernel-level buffer overflow.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Unisoc
Date Reserved
2022-10-11T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d9841c4522896dcbf1af2

Added to database: 5/21/2025, 9:09:21 AM

Last enriched: 6/21/2025, 11:39:35 PM

Last updated: 8/9/2025, 5:33:37 PM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats