CVE-2022-42757: cwe-126 Buffer Over-read in Unisoc (Shanghai) Technologies Co., Ltd. SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8015
In wlan driver, there is a possible missing bounds check, This could lead to local denial of service in wlan services.
AI Analysis
Technical Summary
CVE-2022-42757 is a vulnerability identified in the WLAN driver of several Unisoc (Shanghai) Technologies Co., Ltd. chipsets, including SC9863A, SC9832E, SC7731E, T610, T310, T606, T760, T618, T612, T616, T770, T820, and S8015. These chipsets are commonly integrated into Android devices running versions 10, 11, and 12. The vulnerability stems from a missing bounds check in the WLAN driver, which leads to a buffer over-read condition classified under CWE-126. A buffer over-read occurs when a program reads data beyond the boundaries of a buffer, potentially causing unexpected behavior or crashes. In this case, the flaw can be exploited locally by an attacker with limited privileges (low privileges) to cause a denial of service (DoS) by disrupting WLAN services on the device. The CVSS 3.1 base score is 3.3, indicating a low severity level, with the vector AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L, meaning the attack requires local access, low complexity, low privileges, no user interaction, and impacts only availability without affecting confidentiality or integrity. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability is limited to local denial of service and does not allow remote code execution or privilege escalation. The affected chipsets are widely used in budget and mid-range Android smartphones, particularly those manufactured or sold in markets where Unisoc chipsets have significant penetration. The issue is technical in nature, involving driver-level memory handling errors, and requires local access to the device to trigger the fault, which limits the attack surface primarily to device owners or users with physical or local access.
Potential Impact
For European organizations, the primary impact of CVE-2022-42757 is the potential disruption of WLAN connectivity on devices using affected Unisoc chipsets. This could lead to temporary denial of wireless network services on impacted Android devices, affecting employee productivity, especially in environments relying on mobile connectivity for critical operations. Since the vulnerability requires local access and only causes availability issues without compromising data confidentiality or integrity, the risk to sensitive information is minimal. However, in sectors where continuous connectivity is essential—such as logistics, field services, or healthcare—interruption of WLAN services could degrade operational efficiency. The low severity and lack of remote exploitability reduce the likelihood of widespread attacks targeting European enterprises. Nonetheless, organizations with mobile device management (MDM) policies should be aware of this vulnerability to prevent potential localized disruptions. Consumer devices used by employees may also be affected, potentially impacting bring-your-own-device (BYOD) policies. Given the absence of known exploits, the immediate threat level remains low, but the vulnerability should be monitored for any emerging exploit attempts.
Mitigation Recommendations
Implement strict device access controls to prevent unauthorized local access to devices running affected Unisoc chipsets. Ensure that all Android devices, especially those with Unisoc chipsets, are updated to the latest firmware and OS versions as soon as patches become available from device manufacturers or Unisoc. Deploy mobile device management (MDM) solutions to monitor device health and connectivity status, enabling rapid detection of WLAN service disruptions. Educate users about the importance of physical device security to prevent local exploitation of vulnerabilities requiring local access. For critical operations, consider using devices with chipsets from vendors with faster patch cycles or known robust security track records until patches for Unisoc devices are released. Monitor security advisories from Unisoc and Android OEMs for updates or patches addressing this vulnerability. In environments with high security requirements, restrict the use of affected devices or isolate them on segmented networks to minimize impact in case of WLAN service disruption.
Affected Countries
Germany, France, Italy, Spain, Poland, United Kingdom, Netherlands, Belgium, Sweden, Portugal
CVE-2022-42757: cwe-126 Buffer Over-read in Unisoc (Shanghai) Technologies Co., Ltd. SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8015
Description
In wlan driver, there is a possible missing bounds check, This could lead to local denial of service in wlan services.
AI-Powered Analysis
Technical Analysis
CVE-2022-42757 is a vulnerability identified in the WLAN driver of several Unisoc (Shanghai) Technologies Co., Ltd. chipsets, including SC9863A, SC9832E, SC7731E, T610, T310, T606, T760, T618, T612, T616, T770, T820, and S8015. These chipsets are commonly integrated into Android devices running versions 10, 11, and 12. The vulnerability stems from a missing bounds check in the WLAN driver, which leads to a buffer over-read condition classified under CWE-126. A buffer over-read occurs when a program reads data beyond the boundaries of a buffer, potentially causing unexpected behavior or crashes. In this case, the flaw can be exploited locally by an attacker with limited privileges (low privileges) to cause a denial of service (DoS) by disrupting WLAN services on the device. The CVSS 3.1 base score is 3.3, indicating a low severity level, with the vector AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L, meaning the attack requires local access, low complexity, low privileges, no user interaction, and impacts only availability without affecting confidentiality or integrity. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability is limited to local denial of service and does not allow remote code execution or privilege escalation. The affected chipsets are widely used in budget and mid-range Android smartphones, particularly those manufactured or sold in markets where Unisoc chipsets have significant penetration. The issue is technical in nature, involving driver-level memory handling errors, and requires local access to the device to trigger the fault, which limits the attack surface primarily to device owners or users with physical or local access.
Potential Impact
For European organizations, the primary impact of CVE-2022-42757 is the potential disruption of WLAN connectivity on devices using affected Unisoc chipsets. This could lead to temporary denial of wireless network services on impacted Android devices, affecting employee productivity, especially in environments relying on mobile connectivity for critical operations. Since the vulnerability requires local access and only causes availability issues without compromising data confidentiality or integrity, the risk to sensitive information is minimal. However, in sectors where continuous connectivity is essential—such as logistics, field services, or healthcare—interruption of WLAN services could degrade operational efficiency. The low severity and lack of remote exploitability reduce the likelihood of widespread attacks targeting European enterprises. Nonetheless, organizations with mobile device management (MDM) policies should be aware of this vulnerability to prevent potential localized disruptions. Consumer devices used by employees may also be affected, potentially impacting bring-your-own-device (BYOD) policies. Given the absence of known exploits, the immediate threat level remains low, but the vulnerability should be monitored for any emerging exploit attempts.
Mitigation Recommendations
Implement strict device access controls to prevent unauthorized local access to devices running affected Unisoc chipsets. Ensure that all Android devices, especially those with Unisoc chipsets, are updated to the latest firmware and OS versions as soon as patches become available from device manufacturers or Unisoc. Deploy mobile device management (MDM) solutions to monitor device health and connectivity status, enabling rapid detection of WLAN service disruptions. Educate users about the importance of physical device security to prevent local exploitation of vulnerabilities requiring local access. For critical operations, consider using devices with chipsets from vendors with faster patch cycles or known robust security track records until patches for Unisoc devices are released. Monitor security advisories from Unisoc and Android OEMs for updates or patches addressing this vulnerability. In environments with high security requirements, restrict the use of affected devices or isolate them on segmented networks to minimize impact in case of WLAN service disruption.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Unisoc
- Date Reserved
- 2022-10-11T00:00:00.000Z
- Cisa Enriched
- true
Threat ID: 682d9843c4522896dcbf3100
Added to database: 5/21/2025, 9:09:23 AM
Last enriched: 6/23/2025, 7:35:03 AM
Last updated: 8/13/2025, 6:35:06 AM
Views: 16
Related Threats
CVE-2025-55197: CWE-400: Uncontrolled Resource Consumption in py-pdf pypdf
MediumCVE-2025-8929: SQL Injection in code-projects Medical Store Management System
MediumCVE-2025-8928: SQL Injection in code-projects Medical Store Management System
MediumCVE-2025-34154: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Synergetic Data Systems Inc. UnForm Server Manager
CriticalCVE-2025-8927: Improper Restriction of Excessive Authentication Attempts in mtons mblog
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.