CVE-2022-42763: cwe-190 Integer Overflow in Unisoc (Shanghai) Technologies Co., Ltd. SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8008
In wlan driver, there is a possible missing bounds check, This could lead to local denial of service in wlan services.
AI Analysis
Technical Summary
CVE-2022-42763 is an integer overflow vulnerability identified in the WLAN driver of several Unisoc (Shanghai) Technologies Co., Ltd. chipsets, including SC9863A, SC9832E, SC7731E, T610, T310, T606, T760, T618, T612, T616, T770, T820, and S8008. These chipsets are commonly integrated into Android devices running versions 10, 11, and 12. The root cause of the vulnerability is a missing bounds check in the WLAN driver code, which allows an integer overflow condition to occur. Integer overflow vulnerabilities arise when arithmetic operations exceed the maximum value a variable can hold, causing unexpected behavior such as memory corruption or logic errors. In this case, the overflow can lead to a local denial of service (DoS) condition affecting WLAN services on the device. The vulnerability requires local access with low privileges (PR:L) and does not require user interaction (UI:N). The attack vector is local (AV:L), meaning an attacker must have some level of access to the device, such as through a malicious app or local user account. The vulnerability does not impact confidentiality or integrity but affects availability (A:H), causing WLAN services to become unavailable or unstable. The CVSS 3.1 base score is 5.5, categorized as medium severity. No known exploits are reported in the wild, and no patches have been linked yet. The vulnerability is classified under CWE-190 (Integer Overflow or Wraparound). Given the affected chipsets are widely used in budget and mid-range Android devices, the vulnerability could impact a broad user base, especially in markets where Unisoc chipsets have significant penetration. The technical details indicate the issue was reserved in October 2022 and publicly disclosed in December 2022, with enrichment from CISA, highlighting its recognized importance in cybersecurity circles.
Potential Impact
For European organizations, the primary impact of CVE-2022-42763 is the potential disruption of WLAN connectivity on devices using affected Unisoc chipsets. This can lead to denial of service conditions on mobile devices, impacting employee productivity, especially in environments relying heavily on wireless communications for business operations. While the vulnerability does not compromise data confidentiality or integrity, the loss of network availability can hinder access to corporate resources, cloud services, and communication platforms. Organizations with Bring Your Own Device (BYOD) policies or those deploying mobile devices with Unisoc chipsets may face operational challenges. Additionally, sectors such as manufacturing, logistics, and field services that depend on mobile connectivity could experience service interruptions. The lack of remote exploitability limits the threat to local attackers or malicious applications installed on devices, reducing the risk of widespread exploitation but emphasizing the need for device-level security controls. Given the medium severity, the vulnerability is unlikely to cause critical infrastructure failures but can degrade service quality and user experience.
Mitigation Recommendations
To mitigate CVE-2022-42763 effectively, European organizations should: 1) Inventory and identify devices using affected Unisoc chipsets and Android versions 10 through 12 within their environment. 2) Monitor vendor communications and Unisoc advisories for official patches or firmware updates addressing this vulnerability and apply them promptly once available. 3) Implement strict application control policies to prevent installation of untrusted or potentially malicious local applications that could exploit the vulnerability. 4) Employ Mobile Device Management (MDM) solutions to enforce security policies, restrict local privilege escalation, and monitor device health and WLAN service stability. 5) Educate users on the risks of installing unauthorized apps and the importance of reporting connectivity issues promptly. 6) Where feasible, consider upgrading devices to newer hardware platforms or Android versions not affected by this vulnerability. 7) For critical operational environments, deploy network segmentation and alternative connectivity options to reduce reliance on potentially vulnerable devices. These steps go beyond generic patching advice by focusing on device identification, policy enforcement, and operational continuity planning specific to the nature of this local DoS vulnerability.
Affected Countries
Germany, France, Italy, Spain, Poland, Netherlands, Belgium, Sweden, Finland, Czech Republic, Hungary, Portugal
CVE-2022-42763: cwe-190 Integer Overflow in Unisoc (Shanghai) Technologies Co., Ltd. SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8008
Description
In wlan driver, there is a possible missing bounds check, This could lead to local denial of service in wlan services.
AI-Powered Analysis
Technical Analysis
CVE-2022-42763 is an integer overflow vulnerability identified in the WLAN driver of several Unisoc (Shanghai) Technologies Co., Ltd. chipsets, including SC9863A, SC9832E, SC7731E, T610, T310, T606, T760, T618, T612, T616, T770, T820, and S8008. These chipsets are commonly integrated into Android devices running versions 10, 11, and 12. The root cause of the vulnerability is a missing bounds check in the WLAN driver code, which allows an integer overflow condition to occur. Integer overflow vulnerabilities arise when arithmetic operations exceed the maximum value a variable can hold, causing unexpected behavior such as memory corruption or logic errors. In this case, the overflow can lead to a local denial of service (DoS) condition affecting WLAN services on the device. The vulnerability requires local access with low privileges (PR:L) and does not require user interaction (UI:N). The attack vector is local (AV:L), meaning an attacker must have some level of access to the device, such as through a malicious app or local user account. The vulnerability does not impact confidentiality or integrity but affects availability (A:H), causing WLAN services to become unavailable or unstable. The CVSS 3.1 base score is 5.5, categorized as medium severity. No known exploits are reported in the wild, and no patches have been linked yet. The vulnerability is classified under CWE-190 (Integer Overflow or Wraparound). Given the affected chipsets are widely used in budget and mid-range Android devices, the vulnerability could impact a broad user base, especially in markets where Unisoc chipsets have significant penetration. The technical details indicate the issue was reserved in October 2022 and publicly disclosed in December 2022, with enrichment from CISA, highlighting its recognized importance in cybersecurity circles.
Potential Impact
For European organizations, the primary impact of CVE-2022-42763 is the potential disruption of WLAN connectivity on devices using affected Unisoc chipsets. This can lead to denial of service conditions on mobile devices, impacting employee productivity, especially in environments relying heavily on wireless communications for business operations. While the vulnerability does not compromise data confidentiality or integrity, the loss of network availability can hinder access to corporate resources, cloud services, and communication platforms. Organizations with Bring Your Own Device (BYOD) policies or those deploying mobile devices with Unisoc chipsets may face operational challenges. Additionally, sectors such as manufacturing, logistics, and field services that depend on mobile connectivity could experience service interruptions. The lack of remote exploitability limits the threat to local attackers or malicious applications installed on devices, reducing the risk of widespread exploitation but emphasizing the need for device-level security controls. Given the medium severity, the vulnerability is unlikely to cause critical infrastructure failures but can degrade service quality and user experience.
Mitigation Recommendations
To mitigate CVE-2022-42763 effectively, European organizations should: 1) Inventory and identify devices using affected Unisoc chipsets and Android versions 10 through 12 within their environment. 2) Monitor vendor communications and Unisoc advisories for official patches or firmware updates addressing this vulnerability and apply them promptly once available. 3) Implement strict application control policies to prevent installation of untrusted or potentially malicious local applications that could exploit the vulnerability. 4) Employ Mobile Device Management (MDM) solutions to enforce security policies, restrict local privilege escalation, and monitor device health and WLAN service stability. 5) Educate users on the risks of installing unauthorized apps and the importance of reporting connectivity issues promptly. 6) Where feasible, consider upgrading devices to newer hardware platforms or Android versions not affected by this vulnerability. 7) For critical operational environments, deploy network segmentation and alternative connectivity options to reduce reliance on potentially vulnerable devices. These steps go beyond generic patching advice by focusing on device identification, policy enforcement, and operational continuity planning specific to the nature of this local DoS vulnerability.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Unisoc
- Date Reserved
- 2022-10-11T00:00:00.000Z
- Cisa Enriched
- true
Threat ID: 682d9843c4522896dcbf314b
Added to database: 5/21/2025, 9:09:23 AM
Last enriched: 6/23/2025, 7:20:59 AM
Last updated: 8/1/2025, 1:44:03 AM
Views: 11
Related Threats
CVE-2025-9091: Hard-coded Credentials in Tenda AC20
LowCVE-2025-9090: Command Injection in Tenda AC20
MediumCVE-2025-9092: CWE-400 Uncontrolled Resource Consumption in Legion of the Bouncy Castle Inc. Bouncy Castle for Java - BC-FJA 2.1.0
LowCVE-2025-9089: Stack-based Buffer Overflow in Tenda AC20
HighCVE-2025-9088: Stack-based Buffer Overflow in Tenda AC20
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.