CVE-2022-42763: cwe-190 Integer Overflow in Unisoc (Shanghai) Technologies Co., Ltd. SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8008
In wlan driver, there is a possible missing bounds check, This could lead to local denial of service in wlan services.
AI Analysis
Technical Summary
CVE-2022-42763 is an integer overflow vulnerability identified in the WLAN driver of several Unisoc (Shanghai) Technologies Co., Ltd. chipsets, including SC9863A, SC9832E, SC7731E, T610, T310, T606, T760, T618, T612, T616, T770, T820, and S8008. These chipsets are commonly integrated into Android devices running versions 10, 11, and 12. The root cause of the vulnerability is a missing bounds check in the WLAN driver code, which allows an integer overflow condition to occur. Integer overflow vulnerabilities arise when arithmetic operations exceed the maximum value a variable can hold, causing unexpected behavior such as memory corruption or logic errors. In this case, the overflow can lead to a local denial of service (DoS) condition affecting WLAN services on the device. The vulnerability requires local access with low privileges (PR:L) and does not require user interaction (UI:N). The attack vector is local (AV:L), meaning an attacker must have some level of access to the device, such as through a malicious app or local user account. The vulnerability does not impact confidentiality or integrity but affects availability (A:H), causing WLAN services to become unavailable or unstable. The CVSS 3.1 base score is 5.5, categorized as medium severity. No known exploits are reported in the wild, and no patches have been linked yet. The vulnerability is classified under CWE-190 (Integer Overflow or Wraparound). Given the affected chipsets are widely used in budget and mid-range Android devices, the vulnerability could impact a broad user base, especially in markets where Unisoc chipsets have significant penetration. The technical details indicate the issue was reserved in October 2022 and publicly disclosed in December 2022, with enrichment from CISA, highlighting its recognized importance in cybersecurity circles.
Potential Impact
For European organizations, the primary impact of CVE-2022-42763 is the potential disruption of WLAN connectivity on devices using affected Unisoc chipsets. This can lead to denial of service conditions on mobile devices, impacting employee productivity, especially in environments relying heavily on wireless communications for business operations. While the vulnerability does not compromise data confidentiality or integrity, the loss of network availability can hinder access to corporate resources, cloud services, and communication platforms. Organizations with Bring Your Own Device (BYOD) policies or those deploying mobile devices with Unisoc chipsets may face operational challenges. Additionally, sectors such as manufacturing, logistics, and field services that depend on mobile connectivity could experience service interruptions. The lack of remote exploitability limits the threat to local attackers or malicious applications installed on devices, reducing the risk of widespread exploitation but emphasizing the need for device-level security controls. Given the medium severity, the vulnerability is unlikely to cause critical infrastructure failures but can degrade service quality and user experience.
Mitigation Recommendations
To mitigate CVE-2022-42763 effectively, European organizations should: 1) Inventory and identify devices using affected Unisoc chipsets and Android versions 10 through 12 within their environment. 2) Monitor vendor communications and Unisoc advisories for official patches or firmware updates addressing this vulnerability and apply them promptly once available. 3) Implement strict application control policies to prevent installation of untrusted or potentially malicious local applications that could exploit the vulnerability. 4) Employ Mobile Device Management (MDM) solutions to enforce security policies, restrict local privilege escalation, and monitor device health and WLAN service stability. 5) Educate users on the risks of installing unauthorized apps and the importance of reporting connectivity issues promptly. 6) Where feasible, consider upgrading devices to newer hardware platforms or Android versions not affected by this vulnerability. 7) For critical operational environments, deploy network segmentation and alternative connectivity options to reduce reliance on potentially vulnerable devices. These steps go beyond generic patching advice by focusing on device identification, policy enforcement, and operational continuity planning specific to the nature of this local DoS vulnerability.
Affected Countries
Germany, France, Italy, Spain, Poland, Netherlands, Belgium, Sweden, Finland, Czech Republic, Hungary, Portugal
CVE-2022-42763: cwe-190 Integer Overflow in Unisoc (Shanghai) Technologies Co., Ltd. SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8008
Description
In wlan driver, there is a possible missing bounds check, This could lead to local denial of service in wlan services.
AI-Powered Analysis
Technical Analysis
CVE-2022-42763 is an integer overflow vulnerability identified in the WLAN driver of several Unisoc (Shanghai) Technologies Co., Ltd. chipsets, including SC9863A, SC9832E, SC7731E, T610, T310, T606, T760, T618, T612, T616, T770, T820, and S8008. These chipsets are commonly integrated into Android devices running versions 10, 11, and 12. The root cause of the vulnerability is a missing bounds check in the WLAN driver code, which allows an integer overflow condition to occur. Integer overflow vulnerabilities arise when arithmetic operations exceed the maximum value a variable can hold, causing unexpected behavior such as memory corruption or logic errors. In this case, the overflow can lead to a local denial of service (DoS) condition affecting WLAN services on the device. The vulnerability requires local access with low privileges (PR:L) and does not require user interaction (UI:N). The attack vector is local (AV:L), meaning an attacker must have some level of access to the device, such as through a malicious app or local user account. The vulnerability does not impact confidentiality or integrity but affects availability (A:H), causing WLAN services to become unavailable or unstable. The CVSS 3.1 base score is 5.5, categorized as medium severity. No known exploits are reported in the wild, and no patches have been linked yet. The vulnerability is classified under CWE-190 (Integer Overflow or Wraparound). Given the affected chipsets are widely used in budget and mid-range Android devices, the vulnerability could impact a broad user base, especially in markets where Unisoc chipsets have significant penetration. The technical details indicate the issue was reserved in October 2022 and publicly disclosed in December 2022, with enrichment from CISA, highlighting its recognized importance in cybersecurity circles.
Potential Impact
For European organizations, the primary impact of CVE-2022-42763 is the potential disruption of WLAN connectivity on devices using affected Unisoc chipsets. This can lead to denial of service conditions on mobile devices, impacting employee productivity, especially in environments relying heavily on wireless communications for business operations. While the vulnerability does not compromise data confidentiality or integrity, the loss of network availability can hinder access to corporate resources, cloud services, and communication platforms. Organizations with Bring Your Own Device (BYOD) policies or those deploying mobile devices with Unisoc chipsets may face operational challenges. Additionally, sectors such as manufacturing, logistics, and field services that depend on mobile connectivity could experience service interruptions. The lack of remote exploitability limits the threat to local attackers or malicious applications installed on devices, reducing the risk of widespread exploitation but emphasizing the need for device-level security controls. Given the medium severity, the vulnerability is unlikely to cause critical infrastructure failures but can degrade service quality and user experience.
Mitigation Recommendations
To mitigate CVE-2022-42763 effectively, European organizations should: 1) Inventory and identify devices using affected Unisoc chipsets and Android versions 10 through 12 within their environment. 2) Monitor vendor communications and Unisoc advisories for official patches or firmware updates addressing this vulnerability and apply them promptly once available. 3) Implement strict application control policies to prevent installation of untrusted or potentially malicious local applications that could exploit the vulnerability. 4) Employ Mobile Device Management (MDM) solutions to enforce security policies, restrict local privilege escalation, and monitor device health and WLAN service stability. 5) Educate users on the risks of installing unauthorized apps and the importance of reporting connectivity issues promptly. 6) Where feasible, consider upgrading devices to newer hardware platforms or Android versions not affected by this vulnerability. 7) For critical operational environments, deploy network segmentation and alternative connectivity options to reduce reliance on potentially vulnerable devices. These steps go beyond generic patching advice by focusing on device identification, policy enforcement, and operational continuity planning specific to the nature of this local DoS vulnerability.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Unisoc
- Date Reserved
- 2022-10-11T00:00:00.000Z
- Cisa Enriched
- true
Threat ID: 682d9843c4522896dcbf314b
Added to database: 5/21/2025, 9:09:23 AM
Last enriched: 6/23/2025, 7:20:59 AM
Last updated: 2/7/2026, 8:21:48 PM
Views: 34
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2110: Improper Restriction of Excessive Authentication Attempts in Tasin1025 SwiftBuy
MediumCVE-2026-2109: Improper Authorization in jsbroks COCO Annotator
MediumCVE-2026-2108: Denial of Service in jsbroks COCO Annotator
MediumCVE-2026-2107: Improper Authorization in yeqifu warehouse
MediumCVE-2026-2106: Improper Authorization in yeqifu warehouse
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.