Skip to main content

CVE-2023-42716: Vulnerability in Unisoc (Shanghai) Technologies Co., Ltd. SC7731E/SC9832E/SC9863A/T310/T606/T612/T616/T610/T618/T760/T770/T820/S8000

High
VulnerabilityCVE-2023-42716cvecve-2023-42716
Published: Mon Dec 04 2023 (12/04/2023, 00:54:14 UTC)
Source: CVE Database V5
Vendor/Project: Unisoc (Shanghai) Technologies Co., Ltd.
Product: SC7731E/SC9832E/SC9863A/T310/T606/T612/T616/T610/T618/T760/T770/T820/S8000

Description

In telephony service, there is a possible missing permission check. This could lead to remote information disclosure no additional execution privileges needed

AI-Powered Analysis

AILast updated: 07/08/2025, 02:26:34 UTC

Technical Analysis

CVE-2023-42716 is a high-severity vulnerability affecting multiple Unisoc (Shanghai) Technologies Co., Ltd. chipsets including SC7731E, SC9832E, SC9863A, T310, T606, T612, T616, T610, T618, T760, T770, T820, and S8000. These chipsets are commonly used in low- to mid-range Android smartphones, particularly those running Android 11 and Android 12. The vulnerability arises from a missing permission check within the telephony service, which is a core component responsible for managing cellular network communications on the device. Due to this missing permission validation, an unauthenticated remote attacker can potentially exploit this flaw to disclose sensitive information without requiring any additional execution privileges or user interaction. The CVSS v3.1 base score of 7.5 reflects the vulnerability's high impact on confidentiality, as it allows unauthorized access to potentially sensitive telephony-related data. The vulnerability is categorized under CWE-668, which relates to improper access control or missing permission checks. Although no known exploits have been reported in the wild as of the publication date, the ease of exploitation (no privileges or user interaction needed) and the critical nature of telephony data make this a significant security concern. The affected chipsets are widely used in various smartphone models, especially in markets where Unisoc chipsets are prevalent due to their cost-effectiveness. The lack of a patch link suggests that a fix may not yet be publicly available, increasing the urgency for affected vendors and users to monitor for updates and apply mitigations promptly once released.

Potential Impact

For European organizations, the impact of this vulnerability could be substantial, particularly for enterprises and government agencies that rely on mobile devices using Unisoc chipsets for communication. Unauthorized disclosure of telephony information could lead to privacy breaches, exposure of call metadata, subscriber identity information, or other sensitive telephony-related data. This could facilitate targeted phishing, social engineering, or surveillance activities against employees, potentially compromising organizational security. Additionally, sectors such as finance, healthcare, and critical infrastructure that depend on secure mobile communications could face increased risks of data leakage or espionage. The vulnerability's remote exploitability without authentication or user interaction heightens the threat level, as attackers could leverage network access to compromise devices silently. Although the vulnerability does not impact integrity or availability directly, the confidentiality breach alone can have cascading effects on trust, compliance with data protection regulations like GDPR, and overall operational security.

Mitigation Recommendations

Given the absence of publicly available patches, European organizations should implement several targeted mitigations: 1) Inventory and identify devices using affected Unisoc chipsets running Android 11 or 12 to assess exposure. 2) Restrict network access to telephony services where possible, such as limiting untrusted network traffic or employing network segmentation to reduce attack surface. 3) Employ mobile device management (MDM) solutions to enforce strict security policies, including disabling unnecessary telephony features or services if feasible. 4) Monitor network traffic for unusual patterns indicative of exploitation attempts targeting telephony services. 5) Engage with device vendors and Unisoc for timely updates and patches, and prioritize patch deployment once available. 6) Educate users about the risks and encourage cautious behavior regarding network connections, especially on untrusted Wi-Fi or cellular networks. 7) Consider deploying endpoint detection and response (EDR) tools capable of identifying anomalous telephony service behavior. These steps go beyond generic advice by focusing on device-specific inventory, network-level controls, and proactive monitoring tailored to the nature of this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Unisoc
Date Reserved
2023-09-13T07:40:40.034Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68386ba5182aa0cae2809bb6

Added to database: 5/29/2025, 2:13:57 PM

Last enriched: 7/8/2025, 2:26:34 AM

Last updated: 8/3/2025, 8:30:40 AM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats