Skip to main content

CVE-2022-42772: cwe-787 Out-of-bounds Write in Unisoc (Shanghai) Technologies Co., Ltd. SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8021

Medium
Published: Tue Dec 06 2022 (12/06/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: Unisoc (Shanghai) Technologies Co., Ltd.
Product: SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8021

Description

In wlan driver, there is a possible missing bounds check, This could lead to local denial of service in wlan services.

AI-Powered Analysis

AILast updated: 06/23/2025, 19:59:18 UTC

Technical Analysis

CVE-2022-42772 is a medium-severity vulnerability identified in the WLAN driver of several Unisoc (Shanghai) Technologies Co., Ltd. chipsets, including SC9863A, SC9832E, SC7731E, and multiple T-series models (T610, T310, T606, T760, T618, T612, T616, T770, T820, S8021). These chipsets are commonly integrated into Android devices running Android 10, 11, and 12. The vulnerability stems from a missing bounds check in the WLAN driver code, specifically an out-of-bounds write condition categorized under CWE-787. This flaw allows an attacker with local privileges and low complexity to write data beyond the intended buffer boundaries within the WLAN driver. Exploitation does not require user interaction but does require local access and low privileges. The impact is primarily a denial of service (DoS) condition affecting WLAN services, potentially causing the wireless network interface to crash or become unresponsive, leading to loss of network connectivity. The CVSS 3.1 base score is 5.5 (medium severity), with vector AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H, indicating local attack vector, low attack complexity, low privileges required, no user interaction, unchanged scope, no confidentiality or integrity impact, but high availability impact. There are no known exploits in the wild, and no patches have been linked yet. The vulnerability was reserved in October 2022 and published in December 2022. Given the affected chipsets are widely used in budget and mid-range Android smartphones, this vulnerability could affect a significant number of devices, especially in markets where Unisoc chipsets have strong penetration. The lack of confidentiality or integrity impact limits the risk to network availability and user experience rather than data compromise. However, persistent DoS conditions could disrupt critical communications on affected devices.

Potential Impact

For European organizations, the primary impact of CVE-2022-42772 is the potential disruption of wireless network connectivity on devices using affected Unisoc chipsets. This could lead to intermittent or prolonged loss of WLAN service on employee smartphones or IoT devices, affecting productivity, communication, and access to corporate resources. Organizations relying on Bring Your Own Device (BYOD) policies or deploying devices with these chipsets in operational environments may experience network instability. While the vulnerability does not allow data theft or privilege escalation, the denial of service could impact critical workflows, especially in sectors dependent on mobile connectivity such as logistics, healthcare, and field services. Additionally, the local attack vector means that an attacker would need physical or local access to the device, limiting remote exploitation risks but increasing concern in shared or public environments. The absence of known exploits reduces immediate threat levels but does not preclude future exploitation. The vulnerability could also affect embedded systems or IoT devices using these chipsets, potentially disrupting industrial or smart city applications within Europe.

Mitigation Recommendations

1. Monitor vendor advisories from Unisoc and device manufacturers for patches or firmware updates addressing this vulnerability and apply them promptly. 2. Implement strict device usage policies restricting physical access to devices in sensitive environments to reduce risk of local exploitation. 3. Employ mobile device management (MDM) solutions to monitor device health and connectivity status, enabling rapid detection of WLAN service disruptions. 4. For organizations deploying IoT or embedded devices with Unisoc chipsets, conduct thorough inventory and risk assessments to identify affected devices and plan for updates or replacements. 5. Educate users on the importance of device security and physical control to mitigate local attack risks. 6. Where possible, configure network fallback options (e.g., cellular data) to maintain connectivity if WLAN services are disrupted. 7. Use network segmentation to isolate critical systems from devices potentially affected by this vulnerability to limit operational impact. 8. Consider deploying endpoint detection tools capable of identifying anomalous WLAN driver crashes or repeated connectivity failures as indicators of attempted exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Unisoc
Date Reserved
2022-10-11T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d9841c4522896dcbf2046

Added to database: 5/21/2025, 9:09:21 AM

Last enriched: 6/23/2025, 7:59:18 PM

Last updated: 8/12/2025, 8:00:28 AM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats