Skip to main content

CVE-2023-42706: Vulnerability in Unisoc (Shanghai) Technologies Co., Ltd. SC7731E/SC9832E/SC9863A/T310/T606/T612/T616/T610/T618/T760/T770/T820/S8000

Medium
VulnerabilityCVE-2023-42706cvecve-2023-42706
Published: Mon Dec 04 2023 (12/04/2023, 00:54:11 UTC)
Source: CVE Database V5
Vendor/Project: Unisoc (Shanghai) Technologies Co., Ltd.
Product: SC7731E/SC9832E/SC9863A/T310/T606/T612/T616/T610/T618/T760/T770/T820/S8000

Description

In firewall service, there is a possible way to write permission usage records of an app due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed

AI-Powered Analysis

AILast updated: 07/08/2025, 02:25:37 UTC

Technical Analysis

CVE-2023-42706 is a medium-severity vulnerability affecting multiple Unisoc (Shanghai) Technologies Co., Ltd. chipsets, specifically models SC7731E, SC9832E, SC9863A, T310, T606, T612, T616, T610, T618, T760, T770, T820, and S8000. These chipsets are integrated into devices running Android 11 and Android 12. The vulnerability resides in the firewall service component of the affected chipsets, where a missing permission check allows an application with limited privileges (requiring only local privileges and no user interaction) to write permission usage records of other apps. This flaw leads to local information disclosure, potentially exposing sensitive data about app permissions and usage patterns without requiring elevated execution privileges or user interaction. The vulnerability is classified under CWE-862 (Missing Authorization), indicating that the firewall service fails to properly enforce authorization checks before allowing access to sensitive data. The CVSS v3.1 base score is 5.5 (medium severity), with the vector AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N, meaning the attack requires local access with low complexity, privileges, and no user interaction, and impacts confidentiality with high impact but no integrity or availability impact. No known exploits are currently reported in the wild, and no patches have been linked yet, suggesting that mitigation may rely on vendor updates or configuration changes once available.

Potential Impact

For European organizations, the primary impact of CVE-2023-42706 is the potential local disclosure of sensitive information related to app permission usage on devices using the affected Unisoc chipsets. This could facilitate further targeted attacks or privacy violations by revealing which apps have certain permissions or usage patterns. Although the vulnerability does not allow remote exploitation or direct code execution, it could be leveraged by malicious insiders or malware already present on the device with limited privileges to escalate information gathering capabilities. This is particularly relevant for sectors handling sensitive personal or corporate data on mobile devices, such as finance, healthcare, and government agencies. The confidentiality breach could undermine compliance with GDPR and other data protection regulations if personal data is indirectly exposed. However, the lack of integrity or availability impact and the requirement for local access reduce the overall risk for organizations with strong endpoint security and device management policies.

Mitigation Recommendations

To mitigate CVE-2023-42706, European organizations should: 1) Monitor for firmware and software updates from device manufacturers and Unisoc that address this vulnerability and prioritize timely patching once available. 2) Enforce strict device usage policies that limit installation of untrusted or unnecessary applications, reducing the risk of local exploitation. 3) Employ mobile device management (MDM) solutions to control app permissions and monitor unusual app behavior indicative of attempts to exploit local vulnerabilities. 4) Restrict physical and local access to devices, especially in high-security environments, to prevent unauthorized local attacks. 5) Conduct regular security audits and penetration testing focused on local privilege escalation and information disclosure vectors to identify similar weaknesses. 6) Educate users about the risks of installing apps from unverified sources and the importance of device security hygiene. These measures go beyond generic advice by focusing on controlling local access and app permissions, which are critical given the nature of this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Unisoc
Date Reserved
2023-09-13T07:40:40.029Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68386f5b182aa0cae2811a7b

Added to database: 5/29/2025, 2:29:47 PM

Last enriched: 7/8/2025, 2:25:37 AM

Last updated: 8/13/2025, 8:40:53 PM

Views: 18

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats