Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2022-42756: CWE-120 Classic Buffer Overflow in Unisoc (Shanghai) Technologies Co., Ltd. SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000

0
High
Published: Tue Dec 06 2022 (12/06/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: Unisoc (Shanghai) Technologies Co., Ltd.
Product: SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000

Description

In sensor driver, there is a possible buffer overflow due to a missing bounds check. This could lead to local denial of service in kernel.

AI-Powered Analysis

AILast updated: 06/21/2025, 23:39:35 UTC

Technical Analysis

CVE-2022-42756 is a high-severity vulnerability identified in several Unisoc (Shanghai) Technologies Co., Ltd. chipsets, including SC9863A, SC9832E, SC7731E, and multiple T-series models (T610, T310, T606, T760, T618, T612, T616, T770, T820, S8000). The vulnerability stems from a classic buffer overflow (CWE-120) in the sensor driver component of these chipsets. Specifically, the flaw arises due to a missing bounds check when handling input data, which allows an attacker with local access to overflow a buffer in kernel space. This overflow can corrupt memory, leading to a denial of service (DoS) condition by crashing the kernel or causing instability. The vulnerability affects devices running Android versions 10, 11, and 12 that incorporate these Unisoc chipsets. The CVSS v3.1 base score is 7.7, indicating high severity, with the vector AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H. This means the attack requires local access (local vector), low attack complexity, no privileges required, no user interaction, and impacts integrity and availability but not confidentiality. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability is significant because kernel-level buffer overflows can lead to system crashes or potentially be leveraged for privilege escalation or code execution, although this CVE specifically notes denial of service as the primary impact. The affected chipsets are commonly used in budget and mid-range smartphones, particularly in markets where Unisoc processors are prevalent. The sensor driver is a critical component interacting with hardware sensors, so exploitation could disrupt device functionality or stability.

Potential Impact

For European organizations, the primary impact of CVE-2022-42756 is the potential for local denial of service on devices using affected Unisoc chipsets running Android 10-12. This could lead to device crashes, instability, or forced reboots, impacting mobile workforce productivity and device reliability. While the vulnerability does not directly compromise confidentiality, the loss of integrity and availability at the kernel level can disrupt critical mobile applications, including secure communications, authentication apps, or enterprise mobile device management (MDM) solutions. Organizations relying on mobile devices with these chipsets for secure access to corporate resources may face operational disruptions. Additionally, if exploited in targeted attacks, this vulnerability could be used as a stepping stone for further local privilege escalation or persistence, although no such exploits are currently known. The impact is more pronounced in sectors with high mobile device usage and sensitive data handling, such as finance, healthcare, and government agencies. Since Unisoc chipsets are more common in lower-cost devices, organizations with BYOD policies or employees using such devices may be more exposed. The lack of patches increases the risk window, emphasizing the need for mitigation. Overall, the threat could degrade device availability and reliability, indirectly affecting business continuity and security posture.

Mitigation Recommendations

1. Inventory and Identification: Organizations should identify mobile devices in use that incorporate Unisoc chipsets listed in the CVE and run Android 10, 11, or 12. This can be done via MDM solutions or device management inventories. 2. Restrict Local Access: Since exploitation requires local access, enforce strict physical security controls and device usage policies to prevent unauthorized access to employee devices. 3. Limit Installation of Untrusted Apps: Use enterprise app stores and restrict installation of apps from unknown sources to reduce the risk of malicious apps triggering the vulnerability. 4. Monitor Device Stability: Implement monitoring for unusual device crashes or reboots that could indicate exploitation attempts. 5. Firmware and OS Updates: Engage with device vendors and Unisoc to obtain patches or firmware updates as they become available. Promptly apply updates once released. 6. Use Endpoint Protection: Deploy mobile endpoint protection platforms capable of detecting anomalous behavior or kernel-level exploits. 7. User Awareness: Educate users about the risks of local exploitation and the importance of not connecting devices to untrusted computers or networks. 8. Network Segmentation: Limit the access of mobile devices to sensitive internal networks unless they meet security compliance, reducing the impact of compromised devices. 9. Incident Response Preparedness: Prepare for potential denial of service incidents by having backup communication methods and device replacement strategies. These mitigations go beyond generic advice by focusing on local access control, device inventory specific to Unisoc chipsets, and proactive monitoring tailored to the nature of this kernel-level buffer overflow.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Unisoc
Date Reserved
2022-10-11T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d9841c4522896dcbf1af2

Added to database: 5/21/2025, 9:09:21 AM

Last enriched: 6/21/2025, 11:39:35 PM

Last updated: 2/7/2026, 8:21:43 PM

Views: 43

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats