CVE-2022-42776: CWE-862 Missing Authorization in Unisoc (Shanghai) Technologies Co., Ltd. SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000
In UscAIEngine service, there is a missing permission check. This could lead to set up UscAIEngine service with no additional execution privileges needed.
AI Analysis
Technical Summary
CVE-2022-42776 is a high-severity vulnerability identified in multiple Unisoc (Shanghai) Technologies Co., Ltd. chipsets, including SC9863A, SC9832E, SC7731E, T610, T310, T606, T760, T618, T612, T616, T770, T820, and S8000, which are commonly integrated into Android devices running Android 10, 11, and 12. The vulnerability stems from a missing authorization check within the UscAIEngine service, a component responsible for AI-related processing on these chipsets. Specifically, the service lacks proper permission validation, allowing an attacker with limited privileges (low-level privileges) to configure or manipulate the UscAIEngine service without requiring additional execution privileges or user interaction. This missing authorization (CWE-862) can lead to a complete compromise of confidentiality, integrity, and availability of the affected device. The CVSS v3.1 score of 7.8 reflects the high impact, with the attack vector being local (AV:L), low attack complexity (AC:L), requiring low privileges (PR:L), no user interaction (UI:N), and impacting confidentiality, integrity, and availability to a high degree (C:H/I:H/A:H). Although no known exploits are currently reported in the wild, the vulnerability presents a significant risk due to the ease of exploitation by a local attacker or malicious application already present on the device. The affected chipsets are widely used in budget and mid-range smartphones, particularly in markets where Unisoc chipsets are prevalent. The vulnerability could be leveraged to escalate privileges, execute arbitrary code, or disrupt device operations by manipulating AI engine configurations, potentially leading to persistent device compromise or denial of service.
Potential Impact
For European organizations, especially those relying on mobile devices powered by Unisoc chipsets, this vulnerability poses a substantial risk. The high impact on confidentiality, integrity, and availability means sensitive corporate data stored or accessed on affected devices could be exposed or manipulated. Attackers could exploit this flaw to install persistent malware, intercept communications, or disrupt critical mobile applications. This is particularly concerning for sectors such as finance, healthcare, and government agencies where mobile security is paramount. Additionally, organizations with Bring Your Own Device (BYOD) policies may face increased risk as employees’ personal devices with vulnerable chipsets could serve as entry points for lateral movement within corporate networks. The lack of user interaction requirement further lowers the barrier for exploitation, increasing the likelihood of successful attacks. Although the attack vector is local, the prevalence of malicious apps or insider threats could facilitate exploitation. Furthermore, the vulnerability could undermine trust in mobile device security, impacting operational continuity and regulatory compliance under GDPR and other data protection frameworks.
Mitigation Recommendations
1. Deploy vendor-provided patches or firmware updates as soon as they become available from Unisoc or device manufacturers. 2. Implement strict application whitelisting and mobile device management (MDM) policies to prevent installation of untrusted or potentially malicious applications that could exploit local vulnerabilities. 3. Enforce least privilege principles on mobile devices, restricting app permissions and disabling unnecessary services to reduce the attack surface. 4. Monitor device behavior for anomalies indicative of exploitation attempts, such as unexpected AI engine configurations or unusual service activity. 5. Educate users on the risks of installing apps from untrusted sources and encourage regular device updates. 6. For organizations deploying mobile security solutions, ensure endpoint detection and response (EDR) tools are configured to detect privilege escalation attempts and suspicious local service manipulations. 7. Consider network segmentation and conditional access policies that limit access from mobile devices until their security posture is verified. 8. Collaborate with device vendors to prioritize patch development and communicate timelines for remediation to end users and IT teams.
Affected Countries
Germany, France, Italy, Spain, Poland, United Kingdom, Netherlands, Belgium, Sweden, Czech Republic
CVE-2022-42776: CWE-862 Missing Authorization in Unisoc (Shanghai) Technologies Co., Ltd. SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000
Description
In UscAIEngine service, there is a missing permission check. This could lead to set up UscAIEngine service with no additional execution privileges needed.
AI-Powered Analysis
Technical Analysis
CVE-2022-42776 is a high-severity vulnerability identified in multiple Unisoc (Shanghai) Technologies Co., Ltd. chipsets, including SC9863A, SC9832E, SC7731E, T610, T310, T606, T760, T618, T612, T616, T770, T820, and S8000, which are commonly integrated into Android devices running Android 10, 11, and 12. The vulnerability stems from a missing authorization check within the UscAIEngine service, a component responsible for AI-related processing on these chipsets. Specifically, the service lacks proper permission validation, allowing an attacker with limited privileges (low-level privileges) to configure or manipulate the UscAIEngine service without requiring additional execution privileges or user interaction. This missing authorization (CWE-862) can lead to a complete compromise of confidentiality, integrity, and availability of the affected device. The CVSS v3.1 score of 7.8 reflects the high impact, with the attack vector being local (AV:L), low attack complexity (AC:L), requiring low privileges (PR:L), no user interaction (UI:N), and impacting confidentiality, integrity, and availability to a high degree (C:H/I:H/A:H). Although no known exploits are currently reported in the wild, the vulnerability presents a significant risk due to the ease of exploitation by a local attacker or malicious application already present on the device. The affected chipsets are widely used in budget and mid-range smartphones, particularly in markets where Unisoc chipsets are prevalent. The vulnerability could be leveraged to escalate privileges, execute arbitrary code, or disrupt device operations by manipulating AI engine configurations, potentially leading to persistent device compromise or denial of service.
Potential Impact
For European organizations, especially those relying on mobile devices powered by Unisoc chipsets, this vulnerability poses a substantial risk. The high impact on confidentiality, integrity, and availability means sensitive corporate data stored or accessed on affected devices could be exposed or manipulated. Attackers could exploit this flaw to install persistent malware, intercept communications, or disrupt critical mobile applications. This is particularly concerning for sectors such as finance, healthcare, and government agencies where mobile security is paramount. Additionally, organizations with Bring Your Own Device (BYOD) policies may face increased risk as employees’ personal devices with vulnerable chipsets could serve as entry points for lateral movement within corporate networks. The lack of user interaction requirement further lowers the barrier for exploitation, increasing the likelihood of successful attacks. Although the attack vector is local, the prevalence of malicious apps or insider threats could facilitate exploitation. Furthermore, the vulnerability could undermine trust in mobile device security, impacting operational continuity and regulatory compliance under GDPR and other data protection frameworks.
Mitigation Recommendations
1. Deploy vendor-provided patches or firmware updates as soon as they become available from Unisoc or device manufacturers. 2. Implement strict application whitelisting and mobile device management (MDM) policies to prevent installation of untrusted or potentially malicious applications that could exploit local vulnerabilities. 3. Enforce least privilege principles on mobile devices, restricting app permissions and disabling unnecessary services to reduce the attack surface. 4. Monitor device behavior for anomalies indicative of exploitation attempts, such as unexpected AI engine configurations or unusual service activity. 5. Educate users on the risks of installing apps from untrusted sources and encourage regular device updates. 6. For organizations deploying mobile security solutions, ensure endpoint detection and response (EDR) tools are configured to detect privilege escalation attempts and suspicious local service manipulations. 7. Consider network segmentation and conditional access policies that limit access from mobile devices until their security posture is verified. 8. Collaborate with device vendors to prioritize patch development and communicate timelines for remediation to end users and IT teams.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Unisoc
- Date Reserved
- 2022-10-11T00:00:00.000Z
- Cisa Enriched
- true
Threat ID: 682d9843c4522896dcbf3159
Added to database: 5/21/2025, 9:09:23 AM
Last enriched: 6/21/2025, 11:16:31 PM
Last updated: 7/27/2025, 12:34:41 AM
Views: 12
Related Threats
CVE-2025-8815: Path Traversal in 猫宁i Morning
MediumCVE-2025-8814: Cross-Site Request Forgery in atjiu pybbs
MediumCVE-2025-8813: Open Redirect in atjiu pybbs
MediumCVE-2025-8812: Cross Site Scripting in atjiu pybbs
MediumCVE-2025-8811: SQL Injection in code-projects Simple Art Gallery
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.