Skip to main content

CVE-2022-42757: cwe-126 Buffer Over-read in Unisoc (Shanghai) Technologies Co., Ltd. SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8015

Low
Published: Tue Dec 06 2022 (12/06/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: Unisoc (Shanghai) Technologies Co., Ltd.
Product: SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8015

Description

In wlan driver, there is a possible missing bounds check, This could lead to local denial of service in wlan services.

AI-Powered Analysis

AILast updated: 06/23/2025, 07:35:03 UTC

Technical Analysis

CVE-2022-42757 is a vulnerability identified in the WLAN driver of several Unisoc (Shanghai) Technologies Co., Ltd. chipsets, including SC9863A, SC9832E, SC7731E, T610, T310, T606, T760, T618, T612, T616, T770, T820, and S8015. These chipsets are commonly integrated into Android devices running versions 10, 11, and 12. The vulnerability stems from a missing bounds check in the WLAN driver, which leads to a buffer over-read condition classified under CWE-126. A buffer over-read occurs when a program reads data beyond the boundaries of a buffer, potentially causing unexpected behavior or crashes. In this case, the flaw can be exploited locally by an attacker with limited privileges (low privileges) to cause a denial of service (DoS) by disrupting WLAN services on the device. The CVSS 3.1 base score is 3.3, indicating a low severity level, with the vector AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L, meaning the attack requires local access, low complexity, low privileges, no user interaction, and impacts only availability without affecting confidentiality or integrity. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability is limited to local denial of service and does not allow remote code execution or privilege escalation. The affected chipsets are widely used in budget and mid-range Android smartphones, particularly those manufactured or sold in markets where Unisoc chipsets have significant penetration. The issue is technical in nature, involving driver-level memory handling errors, and requires local access to the device to trigger the fault, which limits the attack surface primarily to device owners or users with physical or local access.

Potential Impact

For European organizations, the primary impact of CVE-2022-42757 is the potential disruption of WLAN connectivity on devices using affected Unisoc chipsets. This could lead to temporary denial of wireless network services on impacted Android devices, affecting employee productivity, especially in environments relying on mobile connectivity for critical operations. Since the vulnerability requires local access and only causes availability issues without compromising data confidentiality or integrity, the risk to sensitive information is minimal. However, in sectors where continuous connectivity is essential—such as logistics, field services, or healthcare—interruption of WLAN services could degrade operational efficiency. The low severity and lack of remote exploitability reduce the likelihood of widespread attacks targeting European enterprises. Nonetheless, organizations with mobile device management (MDM) policies should be aware of this vulnerability to prevent potential localized disruptions. Consumer devices used by employees may also be affected, potentially impacting bring-your-own-device (BYOD) policies. Given the absence of known exploits, the immediate threat level remains low, but the vulnerability should be monitored for any emerging exploit attempts.

Mitigation Recommendations

Implement strict device access controls to prevent unauthorized local access to devices running affected Unisoc chipsets. Ensure that all Android devices, especially those with Unisoc chipsets, are updated to the latest firmware and OS versions as soon as patches become available from device manufacturers or Unisoc. Deploy mobile device management (MDM) solutions to monitor device health and connectivity status, enabling rapid detection of WLAN service disruptions. Educate users about the importance of physical device security to prevent local exploitation of vulnerabilities requiring local access. For critical operations, consider using devices with chipsets from vendors with faster patch cycles or known robust security track records until patches for Unisoc devices are released. Monitor security advisories from Unisoc and Android OEMs for updates or patches addressing this vulnerability. In environments with high security requirements, restrict the use of affected devices or isolate them on segmented networks to minimize impact in case of WLAN service disruption.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Unisoc
Date Reserved
2022-10-11T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d9843c4522896dcbf3100

Added to database: 5/21/2025, 9:09:23 AM

Last enriched: 6/23/2025, 7:35:03 AM

Last updated: 8/14/2025, 12:23:15 AM

Views: 17

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats