Skip to main content

CVE-2022-42767: cwe-190 Integer Overflow in Unisoc (Shanghai) Technologies Co., Ltd. SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8012

Medium
Published: Tue Dec 06 2022 (12/06/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: Unisoc (Shanghai) Technologies Co., Ltd.
Product: SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8012

Description

In wlan driver, there is a possible missing bounds check, This could lead to local denial of service in wlan services.

AI-Powered Analysis

AILast updated: 06/23/2025, 19:59:41 UTC

Technical Analysis

CVE-2022-42767 is a medium severity vulnerability identified in the WLAN driver of several Unisoc (Shanghai) Technologies Co., Ltd. chipsets, including SC9863A, SC9832E, SC7731E, T610, T310, T606, T760, T618, T612, T616, T770, T820, and S8012. These chipsets are commonly integrated into Android devices running Android 10, 11, and 12. The vulnerability stems from a missing bounds check in the WLAN driver code, which leads to an integer overflow condition (CWE-190). An integer overflow occurs when an arithmetic operation attempts to create a numeric value that is outside the range that can be represented with a given number of bits, causing unexpected behavior. In this case, the overflow can be triggered locally by an attacker with limited privileges, resulting in a denial of service (DoS) condition affecting WLAN services. The CVSS v3.1 base score is 6.6, reflecting a medium severity rating. The attack vector is local (AV:L), requiring no privileges (PR:N) but user interaction (UI:R). The impact on confidentiality is high, integrity is low, and availability is low, indicating that while the attacker may gain some access to sensitive data, the primary impact is service disruption. No known exploits are currently reported in the wild, and no patches have been linked in the provided data, suggesting that mitigation may rely on vendor updates or workarounds. The vulnerability affects a broad range of Unisoc chipsets widely used in budget and mid-range Android smartphones, which are prevalent in various markets globally, including Europe. The vulnerability's exploitation requires local access and user interaction, limiting remote exploitation but still posing a risk in scenarios where malicious applications or users can trigger the flaw locally on affected devices.

Potential Impact

For European organizations, the primary impact of CVE-2022-42767 lies in potential local denial of service on devices using affected Unisoc chipsets. This can disrupt WLAN connectivity, impacting mobile workforce productivity, especially in sectors relying heavily on mobile communications such as logistics, retail, and field services. The high confidentiality impact suggests potential leakage or unauthorized access to WLAN-related data, which could expose sensitive network information or user data. Given the widespread use of Unisoc chipsets in affordable Android devices, organizations with BYOD (Bring Your Own Device) policies or those deploying such devices in operational roles may face increased risk. Although exploitation requires local access and user interaction, social engineering or malicious apps could trigger the vulnerability, leading to service outages or data exposure. The lack of known exploits reduces immediate risk, but the medium severity rating and broad device impact necessitate proactive measures. Critical infrastructure or organizations with high mobility requirements in Europe could experience operational disruptions if devices become unstable or disconnected from WLAN networks. Additionally, sectors with strict data protection requirements (e.g., finance, healthcare) must consider the confidentiality implications.

Mitigation Recommendations

1. Device Inventory and Assessment: Identify all devices using affected Unisoc chipsets within the organization, focusing on Android 10, 11, and 12 versions. 2. Vendor Updates: Monitor Unisoc and device manufacturers for official patches or firmware updates addressing CVE-2022-42767 and apply them promptly. 3. Application Control: Restrict installation of untrusted or unnecessary applications that could exploit local vulnerabilities via user interaction. 4. User Awareness: Educate users about the risks of installing unknown apps and the importance of avoiding suspicious links or prompts that could trigger the vulnerability. 5. Network Segmentation: Limit WLAN access for devices with known vulnerabilities to reduce potential impact on critical network segments. 6. Mobile Device Management (MDM): Use MDM solutions to enforce security policies, control app installations, and push updates efficiently. 7. Monitoring and Incident Response: Implement monitoring for unusual WLAN service disruptions or device behavior indicative of exploitation attempts. 8. Alternative Connectivity: For critical users, consider providing devices with chipsets not affected by this vulnerability or alternative connectivity options until patches are available. These steps go beyond generic advice by focusing on device-specific inventory, user behavior, and network controls tailored to the nature of this local, user-interaction-dependent vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Unisoc
Date Reserved
2022-10-11T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d9841c4522896dcbf2042

Added to database: 5/21/2025, 9:09:21 AM

Last enriched: 6/23/2025, 7:59:41 PM

Last updated: 8/7/2025, 12:46:18 AM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats