CVE-2022-42779: cwe-126 Buffer Over-read in Unisoc (Shanghai) Technologies Co., Ltd. SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8003
In wlan driver, there is a possible missing bounds check, This could lead to local denial of service in wlan services.
AI Analysis
Technical Summary
CVE-2022-42779 is a medium-severity vulnerability identified in the WLAN driver of several Unisoc (Shanghai) Technologies Co., Ltd. chipsets, including SC9863A, SC9832E, SC7731E, T310, T606, T610, T618, T612, T616, T760, T770, T820, and S8003. These chipsets are commonly integrated into Android devices running versions 10, 11, and 12. The vulnerability stems from a missing bounds check in the WLAN driver code, which leads to a buffer over-read condition classified under CWE-126. A buffer over-read occurs when a program reads data beyond the allocated buffer boundaries, potentially causing memory corruption or crashes. In this case, the flaw can be exploited locally by an attacker with low privileges (local access with low complexity) to trigger a denial of service (DoS) condition affecting WLAN services. The CVSS v3.1 base score is 5.5, reflecting a medium impact primarily on availability, with no impact on confidentiality or integrity. Exploitation does not require user interaction but does require local privileges, meaning an attacker must already have some level of access to the device. There are no known exploits in the wild, and no patches have been publicly linked yet. The vulnerability could cause WLAN service crashes or instability, disrupting network connectivity on affected devices. Since the flaw is in the WLAN driver, it is specific to devices using these Unisoc chipsets, which are prevalent in certain budget and mid-range Android smartphones and IoT devices. The vulnerability does not allow remote exploitation or privilege escalation but can degrade device availability locally.
Potential Impact
For European organizations, the primary impact of CVE-2022-42779 is the potential disruption of wireless network connectivity on devices using affected Unisoc chipsets. This could affect employees using vulnerable Android devices for corporate communications, remote access, or IoT device management. Denial of service in WLAN services could lead to loss of productivity, interrupted communications, and potential operational delays, especially in environments relying on wireless connectivity for critical functions. While the vulnerability does not compromise data confidentiality or integrity, the availability impact could be significant in sectors with high dependence on mobile connectivity, such as logistics, field services, and remote workforces. Additionally, IoT deployments using these chipsets in industrial or smart building contexts could experience network outages, affecting automation or monitoring systems. However, the requirement for local access limits the attack surface to insiders or attackers who have already compromised the device. The absence of known exploits reduces immediate risk but does not eliminate the threat of future exploitation. Organizations should assess their device inventories to identify the presence of affected chipsets and consider the operational impact of potential WLAN service disruptions.
Mitigation Recommendations
1. Inventory and Identification: Conduct a thorough inventory of Android devices and IoT equipment to identify those using Unisoc chipsets listed in the vulnerability. 2. Firmware and Driver Updates: Engage with device manufacturers and Unisoc to obtain and deploy firmware or driver updates that address the missing bounds check. Even if no official patch is publicly available, monitor vendor advisories closely. 3. Access Controls: Restrict local access to devices by enforcing strong device authentication, limiting physical access, and controlling app installation to reduce the risk of local exploitation. 4. Network Segmentation: Isolate vulnerable devices on separate network segments to minimize the impact of WLAN service disruptions on critical infrastructure. 5. Monitoring and Incident Response: Implement monitoring for unusual WLAN service crashes or connectivity issues that could indicate exploitation attempts. Prepare incident response plans to quickly restore connectivity. 6. User Awareness: Educate users about the risks of installing untrusted applications or granting unnecessary permissions that could enable local attackers. 7. Alternative Connectivity: For critical operations, consider fallback connectivity options (e.g., wired Ethernet or alternative wireless interfaces) to maintain availability during WLAN outages. 8. Vendor Collaboration: Work with device vendors to prioritize patch development and deployment, and request transparency on timelines for fixes.
Affected Countries
Germany, France, Italy, Spain, Poland, United Kingdom, Netherlands, Belgium, Sweden, Finland
CVE-2022-42779: cwe-126 Buffer Over-read in Unisoc (Shanghai) Technologies Co., Ltd. SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8003
Description
In wlan driver, there is a possible missing bounds check, This could lead to local denial of service in wlan services.
AI-Powered Analysis
Technical Analysis
CVE-2022-42779 is a medium-severity vulnerability identified in the WLAN driver of several Unisoc (Shanghai) Technologies Co., Ltd. chipsets, including SC9863A, SC9832E, SC7731E, T310, T606, T610, T618, T612, T616, T760, T770, T820, and S8003. These chipsets are commonly integrated into Android devices running versions 10, 11, and 12. The vulnerability stems from a missing bounds check in the WLAN driver code, which leads to a buffer over-read condition classified under CWE-126. A buffer over-read occurs when a program reads data beyond the allocated buffer boundaries, potentially causing memory corruption or crashes. In this case, the flaw can be exploited locally by an attacker with low privileges (local access with low complexity) to trigger a denial of service (DoS) condition affecting WLAN services. The CVSS v3.1 base score is 5.5, reflecting a medium impact primarily on availability, with no impact on confidentiality or integrity. Exploitation does not require user interaction but does require local privileges, meaning an attacker must already have some level of access to the device. There are no known exploits in the wild, and no patches have been publicly linked yet. The vulnerability could cause WLAN service crashes or instability, disrupting network connectivity on affected devices. Since the flaw is in the WLAN driver, it is specific to devices using these Unisoc chipsets, which are prevalent in certain budget and mid-range Android smartphones and IoT devices. The vulnerability does not allow remote exploitation or privilege escalation but can degrade device availability locally.
Potential Impact
For European organizations, the primary impact of CVE-2022-42779 is the potential disruption of wireless network connectivity on devices using affected Unisoc chipsets. This could affect employees using vulnerable Android devices for corporate communications, remote access, or IoT device management. Denial of service in WLAN services could lead to loss of productivity, interrupted communications, and potential operational delays, especially in environments relying on wireless connectivity for critical functions. While the vulnerability does not compromise data confidentiality or integrity, the availability impact could be significant in sectors with high dependence on mobile connectivity, such as logistics, field services, and remote workforces. Additionally, IoT deployments using these chipsets in industrial or smart building contexts could experience network outages, affecting automation or monitoring systems. However, the requirement for local access limits the attack surface to insiders or attackers who have already compromised the device. The absence of known exploits reduces immediate risk but does not eliminate the threat of future exploitation. Organizations should assess their device inventories to identify the presence of affected chipsets and consider the operational impact of potential WLAN service disruptions.
Mitigation Recommendations
1. Inventory and Identification: Conduct a thorough inventory of Android devices and IoT equipment to identify those using Unisoc chipsets listed in the vulnerability. 2. Firmware and Driver Updates: Engage with device manufacturers and Unisoc to obtain and deploy firmware or driver updates that address the missing bounds check. Even if no official patch is publicly available, monitor vendor advisories closely. 3. Access Controls: Restrict local access to devices by enforcing strong device authentication, limiting physical access, and controlling app installation to reduce the risk of local exploitation. 4. Network Segmentation: Isolate vulnerable devices on separate network segments to minimize the impact of WLAN service disruptions on critical infrastructure. 5. Monitoring and Incident Response: Implement monitoring for unusual WLAN service crashes or connectivity issues that could indicate exploitation attempts. Prepare incident response plans to quickly restore connectivity. 6. User Awareness: Educate users about the risks of installing untrusted applications or granting unnecessary permissions that could enable local attackers. 7. Alternative Connectivity: For critical operations, consider fallback connectivity options (e.g., wired Ethernet or alternative wireless interfaces) to maintain availability during WLAN outages. 8. Vendor Collaboration: Work with device vendors to prioritize patch development and deployment, and request transparency on timelines for fixes.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Unisoc
- Date Reserved
- 2022-10-11T00:00:00.000Z
- Cisa Enriched
- true
Threat ID: 682d9844c4522896dcbf34fd
Added to database: 5/21/2025, 9:09:24 AM
Last enriched: 6/23/2025, 4:35:40 AM
Last updated: 2/7/2026, 9:32:53 AM
Views: 33
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2080: Command Injection in UTT HiPER 810
HighCVE-2026-2079: Improper Authorization in yeqifu warehouse
MediumCVE-2026-1675: CWE-1188 Initialization of a Resource with an Insecure Default in brstefanovic Advanced Country Blocker
MediumCVE-2026-1643: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ariagle MP-Ukagaka
MediumCVE-2026-1634: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in alexdtn Subitem AL Slider
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.