Skip to main content

CVE-2022-42763: cwe-190 Integer Overflow in Unisoc (Shanghai) Technologies Co., Ltd. SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8008

Medium
Published: Tue Dec 06 2022 (12/06/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: Unisoc (Shanghai) Technologies Co., Ltd.
Product: SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8008

Description

In wlan driver, there is a possible missing bounds check, This could lead to local denial of service in wlan services.

AI-Powered Analysis

AILast updated: 06/23/2025, 07:20:59 UTC

Technical Analysis

CVE-2022-42763 is an integer overflow vulnerability identified in the WLAN driver of several Unisoc (Shanghai) Technologies Co., Ltd. chipsets, including SC9863A, SC9832E, SC7731E, T610, T310, T606, T760, T618, T612, T616, T770, T820, and S8008. These chipsets are commonly integrated into Android devices running versions 10, 11, and 12. The root cause of the vulnerability is a missing bounds check in the WLAN driver code, which allows an integer overflow condition to occur. Integer overflow vulnerabilities arise when arithmetic operations exceed the maximum value a variable can hold, causing unexpected behavior such as memory corruption or logic errors. In this case, the overflow can lead to a local denial of service (DoS) condition affecting WLAN services on the device. The vulnerability requires local access with low privileges (PR:L) and does not require user interaction (UI:N). The attack vector is local (AV:L), meaning an attacker must have some level of access to the device, such as through a malicious app or local user account. The vulnerability does not impact confidentiality or integrity but affects availability (A:H), causing WLAN services to become unavailable or unstable. The CVSS 3.1 base score is 5.5, categorized as medium severity. No known exploits are reported in the wild, and no patches have been linked yet. The vulnerability is classified under CWE-190 (Integer Overflow or Wraparound). Given the affected chipsets are widely used in budget and mid-range Android devices, the vulnerability could impact a broad user base, especially in markets where Unisoc chipsets have significant penetration. The technical details indicate the issue was reserved in October 2022 and publicly disclosed in December 2022, with enrichment from CISA, highlighting its recognized importance in cybersecurity circles.

Potential Impact

For European organizations, the primary impact of CVE-2022-42763 is the potential disruption of WLAN connectivity on devices using affected Unisoc chipsets. This can lead to denial of service conditions on mobile devices, impacting employee productivity, especially in environments relying heavily on wireless communications for business operations. While the vulnerability does not compromise data confidentiality or integrity, the loss of network availability can hinder access to corporate resources, cloud services, and communication platforms. Organizations with Bring Your Own Device (BYOD) policies or those deploying mobile devices with Unisoc chipsets may face operational challenges. Additionally, sectors such as manufacturing, logistics, and field services that depend on mobile connectivity could experience service interruptions. The lack of remote exploitability limits the threat to local attackers or malicious applications installed on devices, reducing the risk of widespread exploitation but emphasizing the need for device-level security controls. Given the medium severity, the vulnerability is unlikely to cause critical infrastructure failures but can degrade service quality and user experience.

Mitigation Recommendations

To mitigate CVE-2022-42763 effectively, European organizations should: 1) Inventory and identify devices using affected Unisoc chipsets and Android versions 10 through 12 within their environment. 2) Monitor vendor communications and Unisoc advisories for official patches or firmware updates addressing this vulnerability and apply them promptly once available. 3) Implement strict application control policies to prevent installation of untrusted or potentially malicious local applications that could exploit the vulnerability. 4) Employ Mobile Device Management (MDM) solutions to enforce security policies, restrict local privilege escalation, and monitor device health and WLAN service stability. 5) Educate users on the risks of installing unauthorized apps and the importance of reporting connectivity issues promptly. 6) Where feasible, consider upgrading devices to newer hardware platforms or Android versions not affected by this vulnerability. 7) For critical operational environments, deploy network segmentation and alternative connectivity options to reduce reliance on potentially vulnerable devices. These steps go beyond generic patching advice by focusing on device identification, policy enforcement, and operational continuity planning specific to the nature of this local DoS vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Unisoc
Date Reserved
2022-10-11T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d9843c4522896dcbf314b

Added to database: 5/21/2025, 9:09:23 AM

Last enriched: 6/23/2025, 7:20:59 AM

Last updated: 8/1/2025, 1:44:03 AM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats