Skip to main content

CVE-2022-42782: cwe-200 Information Disclosure in Unisoc (Shanghai) Technologies Co., Ltd. SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8007

Medium
Published: Tue Dec 06 2022 (12/06/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: Unisoc (Shanghai) Technologies Co., Ltd.
Product: SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8007

Description

In wlan driver, there is a possible missing permission check, This could lead to local information disclosure.

AI-Powered Analysis

AILast updated: 06/23/2025, 04:35:05 UTC

Technical Analysis

CVE-2022-42782 is an information disclosure vulnerability identified in the WLAN driver of several Unisoc (Shanghai) Technologies Co., Ltd. chipsets, including SC9863A, SC9832E, SC7731E, T310, T606, T610, T612, T616, T618, T760, T770, T820, and S8007. These chipsets are commonly integrated into Android devices running Android 10, 11, and 12. The vulnerability arises due to a missing permission check within the WLAN driver, which could allow a local attacker with limited privileges (low-level privileges) to access sensitive information without requiring user interaction. The CVSS 3.1 base score is 5.5 (medium severity), with the vector indicating that the attack requires local access (AV:L), low attack complexity (AC:L), low privileges (PR:L), no user interaction (UI:N), and impacts confidentiality (C:H) but not integrity or availability. The scope remains unchanged (S:U). This means an attacker who already has some level of access to the device could exploit this flaw to disclose sensitive information from the WLAN driver or related components. Although no known exploits are currently reported in the wild, the vulnerability could potentially be leveraged for reconnaissance or to gather data that might facilitate further attacks. The affected chipsets are widely used in budget and mid-range Android smartphones, especially those targeting emerging markets, but also present in some European markets. The vulnerability is specific to the WLAN driver, which is a critical component managing wireless network communications, and improper permission checks here can lead to leakage of network-related data or device state information. No official patches or mitigation links are currently published by the vendor, indicating that affected organizations and users must rely on vendor updates or device manufacturer firmware upgrades once available.

Potential Impact

For European organizations, the primary risk posed by CVE-2022-42782 is the potential leakage of sensitive information from devices using affected Unisoc chipsets. This could include network configuration details, wireless credentials, or other sensitive WLAN driver data that might be exploited for lateral movement or targeted attacks within corporate or personal environments. Since the vulnerability requires local access with low privileges, it is most relevant in scenarios where an attacker can gain limited access to a device, such as through malicious apps, insider threats, or physical access. The confidentiality impact is high, but there is no direct impact on integrity or availability, limiting the scope of damage to information disclosure. European organizations with employees or customers using devices powered by these chipsets could face increased risks of data leakage or espionage, especially in sectors handling sensitive data like finance, government, or critical infrastructure. The lack of known exploits reduces immediate urgency but does not eliminate the threat, as attackers may develop exploits over time. The vulnerability could also be leveraged in multi-stage attacks where initial information disclosure facilitates privilege escalation or network infiltration. Given the widespread use of Android devices in Europe, especially in small and medium enterprises and among consumers, the vulnerability represents a moderate but non-negligible risk vector.

Mitigation Recommendations

1. Device and Firmware Updates: Organizations should monitor for firmware or OS updates from device manufacturers or Unisoc that address this vulnerability and apply them promptly. 2. Application Whitelisting and Privilege Management: Limit installation of untrusted or unnecessary applications that could exploit local access to the WLAN driver. Enforce strict privilege separation and least privilege principles on mobile devices. 3. Endpoint Security Solutions: Deploy mobile threat defense (MTD) solutions capable of detecting suspicious local activity or privilege escalation attempts on Android devices. 4. Network Segmentation: Restrict sensitive network resources from being accessed by devices with potentially vulnerable chipsets until patched. 5. Physical Security Controls: Prevent unauthorized physical access to devices, as local access is required for exploitation. 6. User Awareness and Policies: Educate users on risks of installing untrusted apps and the importance of applying updates. 7. Monitoring and Incident Response: Implement monitoring for anomalous behavior on mobile endpoints and have incident response plans tailored for mobile device compromises. 8. Vendor Engagement: Engage with device vendors to obtain timelines for patches and request security bulletins. Given the absence of official patches at present, organizations should prioritize risk assessment of devices with these chipsets and consider temporary compensating controls such as restricting sensitive operations on vulnerable devices.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Unisoc
Date Reserved
2022-10-11T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d9844c4522896dcbf3512

Added to database: 5/21/2025, 9:09:24 AM

Last enriched: 6/23/2025, 4:35:05 AM

Last updated: 7/31/2025, 10:44:03 AM

Views: 9

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats