CVE-2022-42769: cwe-125 Out-of-bounds Read in Unisoc (Shanghai) Technologies Co., Ltd. SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8014
In wlan driver, there is a possible missing bounds check, This could lead to local denial of service in wlan services.
AI Analysis
Technical Summary
CVE-2022-42769 is a vulnerability identified in the WLAN driver of several Unisoc (Shanghai) Technologies Co., Ltd. chipsets, including SC9863A, SC9832E, SC7731E, T610, T310, T606, T760, T618, T612, T616, T770, T820, and S8014. These chipsets are used in various Android devices running Android 10, 11, and 12. The vulnerability is classified as a CWE-125: Out-of-bounds Read, which occurs due to a missing bounds check in the WLAN driver code. This flaw allows the driver to read memory beyond the intended buffer limits, potentially leading to instability in the WLAN services. The primary impact of this vulnerability is a local denial of service (DoS) condition affecting wireless LAN functionality. The CVSS v3.1 base score is 3.3, indicating a low severity level, with the attack vector being local (AV:L), requiring low attack complexity (AC:L), low privileges (PR:L), and no user interaction (UI:N). The vulnerability does not impact confidentiality or integrity but affects availability by causing service disruption. There are no known exploits in the wild, and no patches have been linked in the provided data. The vulnerability affects devices using the specified Unisoc chipsets, which are commonly found in budget and mid-range Android smartphones, particularly in markets where Unisoc SoCs are prevalent. The issue is reserved since October 2022 and publicly disclosed in December 2022. Given the local nature of the attack, exploitation requires access to the device, likely through a local user or malicious application with limited privileges, but no user interaction is needed once the attacker has local access.
Potential Impact
For European organizations, the impact of CVE-2022-42769 is primarily limited to availability disruptions on devices using affected Unisoc chipsets. Since the vulnerability causes a local denial of service in WLAN services, affected devices may experience intermittent or complete loss of wireless connectivity, which can disrupt business operations relying on mobile connectivity. This could affect employees using vulnerable Android devices for corporate communications, remote access, or IoT devices incorporating these chipsets. However, the low severity and local attack vector reduce the likelihood of widespread impact. Confidentiality and integrity of data are not compromised, so data breaches or unauthorized data manipulation are not expected from this vulnerability alone. The absence of known exploits and the requirement for local access further limit the threat scope. Nonetheless, organizations with a significant number of devices using Unisoc chipsets should be aware of potential service interruptions, especially in environments where wireless connectivity is critical. The vulnerability could also be leveraged as part of a multi-stage attack if combined with other vulnerabilities, but on its own, it mainly poses a risk of service degradation or temporary denial of WLAN functionality.
Mitigation Recommendations
To mitigate CVE-2022-42769, organizations should: 1) Identify and inventory devices using the affected Unisoc chipsets and Android versions (10, 11, 12). 2) Monitor vendor and Unisoc communications for official patches or firmware updates addressing this vulnerability and apply them promptly once available. 3) Restrict local access to devices by enforcing strong device access controls, including screen locks, device encryption, and limiting installation of untrusted applications to reduce the risk of local exploitation. 4) Employ mobile device management (MDM) solutions to enforce security policies and monitor device health and connectivity issues that may indicate exploitation attempts. 5) Educate users about the risks of installing untrusted apps or granting unnecessary permissions that could facilitate local attacks. 6) For critical environments, consider network segmentation or use of alternative devices with chipsets not affected by this vulnerability until patches are available. 7) Implement robust incident response procedures to quickly identify and remediate WLAN service disruptions potentially caused by this vulnerability. These steps go beyond generic advice by focusing on device-specific inventory, access control, and proactive monitoring tailored to the nature of this local, low-severity vulnerability.
Affected Countries
Germany, France, Italy, Spain, United Kingdom, Poland, Netherlands
CVE-2022-42769: cwe-125 Out-of-bounds Read in Unisoc (Shanghai) Technologies Co., Ltd. SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8014
Description
In wlan driver, there is a possible missing bounds check, This could lead to local denial of service in wlan services.
AI-Powered Analysis
Technical Analysis
CVE-2022-42769 is a vulnerability identified in the WLAN driver of several Unisoc (Shanghai) Technologies Co., Ltd. chipsets, including SC9863A, SC9832E, SC7731E, T610, T310, T606, T760, T618, T612, T616, T770, T820, and S8014. These chipsets are used in various Android devices running Android 10, 11, and 12. The vulnerability is classified as a CWE-125: Out-of-bounds Read, which occurs due to a missing bounds check in the WLAN driver code. This flaw allows the driver to read memory beyond the intended buffer limits, potentially leading to instability in the WLAN services. The primary impact of this vulnerability is a local denial of service (DoS) condition affecting wireless LAN functionality. The CVSS v3.1 base score is 3.3, indicating a low severity level, with the attack vector being local (AV:L), requiring low attack complexity (AC:L), low privileges (PR:L), and no user interaction (UI:N). The vulnerability does not impact confidentiality or integrity but affects availability by causing service disruption. There are no known exploits in the wild, and no patches have been linked in the provided data. The vulnerability affects devices using the specified Unisoc chipsets, which are commonly found in budget and mid-range Android smartphones, particularly in markets where Unisoc SoCs are prevalent. The issue is reserved since October 2022 and publicly disclosed in December 2022. Given the local nature of the attack, exploitation requires access to the device, likely through a local user or malicious application with limited privileges, but no user interaction is needed once the attacker has local access.
Potential Impact
For European organizations, the impact of CVE-2022-42769 is primarily limited to availability disruptions on devices using affected Unisoc chipsets. Since the vulnerability causes a local denial of service in WLAN services, affected devices may experience intermittent or complete loss of wireless connectivity, which can disrupt business operations relying on mobile connectivity. This could affect employees using vulnerable Android devices for corporate communications, remote access, or IoT devices incorporating these chipsets. However, the low severity and local attack vector reduce the likelihood of widespread impact. Confidentiality and integrity of data are not compromised, so data breaches or unauthorized data manipulation are not expected from this vulnerability alone. The absence of known exploits and the requirement for local access further limit the threat scope. Nonetheless, organizations with a significant number of devices using Unisoc chipsets should be aware of potential service interruptions, especially in environments where wireless connectivity is critical. The vulnerability could also be leveraged as part of a multi-stage attack if combined with other vulnerabilities, but on its own, it mainly poses a risk of service degradation or temporary denial of WLAN functionality.
Mitigation Recommendations
To mitigate CVE-2022-42769, organizations should: 1) Identify and inventory devices using the affected Unisoc chipsets and Android versions (10, 11, 12). 2) Monitor vendor and Unisoc communications for official patches or firmware updates addressing this vulnerability and apply them promptly once available. 3) Restrict local access to devices by enforcing strong device access controls, including screen locks, device encryption, and limiting installation of untrusted applications to reduce the risk of local exploitation. 4) Employ mobile device management (MDM) solutions to enforce security policies and monitor device health and connectivity issues that may indicate exploitation attempts. 5) Educate users about the risks of installing untrusted apps or granting unnecessary permissions that could facilitate local attacks. 6) For critical environments, consider network segmentation or use of alternative devices with chipsets not affected by this vulnerability until patches are available. 7) Implement robust incident response procedures to quickly identify and remediate WLAN service disruptions potentially caused by this vulnerability. These steps go beyond generic advice by focusing on device-specific inventory, access control, and proactive monitoring tailored to the nature of this local, low-severity vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Unisoc
- Date Reserved
- 2022-10-11T00:00:00.000Z
- Cisa Enriched
- true
Threat ID: 682d9847c4522896dcbf5981
Added to database: 5/21/2025, 9:09:27 AM
Last enriched: 6/22/2025, 7:22:27 AM
Last updated: 9/26/2025, 3:35:25 AM
Views: 25
Related Threats
CVE-2025-9952: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in sergiotrinity Trinity Audio – Text to Speech AI audio player to convert content into audio
MediumCVE-2025-9886: CWE-352 Cross-Site Request Forgery (CSRF) in sergiotrinity Trinity Audio – Text to Speech AI audio player to convert content into audio
MediumCVE-2025-10383: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in contest-gallery Contest Gallery – Upload, Vote & Sell with PayPal and Stripe
MediumCVE-2025-61895
LowCVE-2025-61894
LowActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.