Skip to main content

CVE-2022-42776: CWE-862 Missing Authorization in Unisoc (Shanghai) Technologies Co., Ltd. SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000

High
Published: Tue Dec 06 2022 (12/06/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: Unisoc (Shanghai) Technologies Co., Ltd.
Product: SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000

Description

In UscAIEngine service, there is a missing permission check. This could lead to set up UscAIEngine service with no additional execution privileges needed.

AI-Powered Analysis

AILast updated: 06/21/2025, 23:16:31 UTC

Technical Analysis

CVE-2022-42776 is a high-severity vulnerability identified in multiple Unisoc (Shanghai) Technologies Co., Ltd. chipsets, including SC9863A, SC9832E, SC7731E, T610, T310, T606, T760, T618, T612, T616, T770, T820, and S8000, which are commonly integrated into Android devices running Android 10, 11, and 12. The vulnerability stems from a missing authorization check within the UscAIEngine service, a component responsible for AI-related processing on these chipsets. Specifically, the service lacks proper permission validation, allowing an attacker with limited privileges (low-level privileges) to configure or manipulate the UscAIEngine service without requiring additional execution privileges or user interaction. This missing authorization (CWE-862) can lead to a complete compromise of confidentiality, integrity, and availability of the affected device. The CVSS v3.1 score of 7.8 reflects the high impact, with the attack vector being local (AV:L), low attack complexity (AC:L), requiring low privileges (PR:L), no user interaction (UI:N), and impacting confidentiality, integrity, and availability to a high degree (C:H/I:H/A:H). Although no known exploits are currently reported in the wild, the vulnerability presents a significant risk due to the ease of exploitation by a local attacker or malicious application already present on the device. The affected chipsets are widely used in budget and mid-range smartphones, particularly in markets where Unisoc chipsets are prevalent. The vulnerability could be leveraged to escalate privileges, execute arbitrary code, or disrupt device operations by manipulating AI engine configurations, potentially leading to persistent device compromise or denial of service.

Potential Impact

For European organizations, especially those relying on mobile devices powered by Unisoc chipsets, this vulnerability poses a substantial risk. The high impact on confidentiality, integrity, and availability means sensitive corporate data stored or accessed on affected devices could be exposed or manipulated. Attackers could exploit this flaw to install persistent malware, intercept communications, or disrupt critical mobile applications. This is particularly concerning for sectors such as finance, healthcare, and government agencies where mobile security is paramount. Additionally, organizations with Bring Your Own Device (BYOD) policies may face increased risk as employees’ personal devices with vulnerable chipsets could serve as entry points for lateral movement within corporate networks. The lack of user interaction requirement further lowers the barrier for exploitation, increasing the likelihood of successful attacks. Although the attack vector is local, the prevalence of malicious apps or insider threats could facilitate exploitation. Furthermore, the vulnerability could undermine trust in mobile device security, impacting operational continuity and regulatory compliance under GDPR and other data protection frameworks.

Mitigation Recommendations

1. Deploy vendor-provided patches or firmware updates as soon as they become available from Unisoc or device manufacturers. 2. Implement strict application whitelisting and mobile device management (MDM) policies to prevent installation of untrusted or potentially malicious applications that could exploit local vulnerabilities. 3. Enforce least privilege principles on mobile devices, restricting app permissions and disabling unnecessary services to reduce the attack surface. 4. Monitor device behavior for anomalies indicative of exploitation attempts, such as unexpected AI engine configurations or unusual service activity. 5. Educate users on the risks of installing apps from untrusted sources and encourage regular device updates. 6. For organizations deploying mobile security solutions, ensure endpoint detection and response (EDR) tools are configured to detect privilege escalation attempts and suspicious local service manipulations. 7. Consider network segmentation and conditional access policies that limit access from mobile devices until their security posture is verified. 8. Collaborate with device vendors to prioritize patch development and communicate timelines for remediation to end users and IT teams.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Unisoc
Date Reserved
2022-10-11T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d9843c4522896dcbf3159

Added to database: 5/21/2025, 9:09:23 AM

Last enriched: 6/21/2025, 11:16:31 PM

Last updated: 7/27/2025, 12:34:41 AM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats