Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2022-42775: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer in Unisoc (Shanghai) Technologies Co., Ltd. SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000

0
Medium
Published: Tue Dec 06 2022 (12/06/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: Unisoc (Shanghai) Technologies Co., Ltd.
Product: SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000

Description

In camera driver, there is a possible memory corruption due to improper locking. This could lead to local denial of service in kernel.

AI-Powered Analysis

AILast updated: 06/23/2025, 07:20:32 UTC

Technical Analysis

CVE-2022-42775 is a medium-severity vulnerability identified in the camera driver of several Unisoc (Shanghai) Technologies Co., Ltd. chipsets, including SC9863A, SC9832E, SC7731E, and multiple T-series models (T310, T606, T610, T612, T616, T618, T760, T770, T820) as well as the S8000. These chipsets are commonly integrated into Android devices running versions 10, 11, and 12. The vulnerability stems from improper locking mechanisms within the camera driver, leading to a memory corruption issue classified under CWE-119 (Improper Restriction of Operations within the Bounds of a Memory Buffer). This flaw can be exploited locally by an attacker with low privileges (PR:L) and does not require user interaction (UI:N). The impact is primarily a denial of service (DoS) condition at the kernel level, potentially causing the device to crash or become unresponsive. The CVSS v3.1 base score is 5.5, reflecting a medium severity with an attack vector limited to local access, low attack complexity, and no confidentiality or integrity impact, but high impact on availability. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability was reserved in October 2022 and publicly disclosed in December 2022. Given the kernel-level nature of the flaw, exploitation could disrupt critical device functions, particularly those relying on camera operations, and may require local access to the device, such as through a malicious app or local user compromise.

Potential Impact

For European organizations, the primary impact of CVE-2022-42775 is the potential for local denial of service on devices using affected Unisoc chipsets. This can disrupt business operations relying on mobile devices, especially those using camera functionalities for authentication, remote inspections, or communication. Although the vulnerability does not compromise confidentiality or integrity, the availability impact at the kernel level can cause device crashes or reboots, leading to productivity loss and potential operational downtime. Organizations deploying mobile device management (MDM) solutions or relying on mobile endpoints with these chipsets may face increased support costs and user disruption. The lack of remote exploitability limits the threat to scenarios where an attacker has local access or can trick users into installing malicious applications. However, given the widespread use of Unisoc chipsets in budget and mid-range devices, this vulnerability could affect a significant number of consumer and enterprise devices in Europe, particularly in sectors with high mobile device usage such as retail, logistics, and field services.

Mitigation Recommendations

Monitor vendor advisories from Unisoc and device manufacturers for official patches or firmware updates addressing this vulnerability and apply them promptly. Implement strict application whitelisting and mobile device management policies to prevent installation of untrusted or malicious applications that could exploit local vulnerabilities. Enforce least privilege principles on mobile devices, restricting local user permissions to reduce the risk of local exploitation. Conduct regular security awareness training for users to avoid installing unverified apps or granting unnecessary permissions that could facilitate local attacks. Where possible, isolate critical mobile devices from untrusted networks and limit physical access to devices to reduce the risk of local exploitation. Use runtime protection tools or endpoint detection and response (EDR) solutions capable of monitoring for anomalous kernel-level activity on mobile devices, if supported. Perform regular device health checks and monitor for unexpected crashes or reboots that may indicate exploitation attempts.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Unisoc
Date Reserved
2022-10-11T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d9843c4522896dcbf3153

Added to database: 5/21/2025, 9:09:23 AM

Last enriched: 6/23/2025, 7:20:32 AM

Last updated: 2/7/2026, 1:57:14 AM

Views: 46

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats