Skip to main content

CVE-2023-42726: Vulnerability in Unisoc (Shanghai) Technologies Co., Ltd. SC9863A/T310/T606/T612/T616/T610/T618/T760/T770/T820/S8000

Medium
VulnerabilityCVE-2023-42726cvecve-2023-42726
Published: Mon Dec 04 2023 (12/04/2023, 00:54:17 UTC)
Source: CVE Database V5
Vendor/Project: Unisoc (Shanghai) Technologies Co., Ltd.
Product: SC9863A/T310/T606/T612/T616/T610/T618/T760/T770/T820/S8000

Description

In TeleService, there is a possible out of bounds read due to a missing bounds check. This could lead to local denial of service with System execution privileges needed

AI-Powered Analysis

AILast updated: 07/08/2025, 02:26:48 UTC

Technical Analysis

CVE-2023-42726 is a security vulnerability identified in several Unisoc (Shanghai) Technologies Co., Ltd. chipsets, specifically the SC9863A, T310, T606, T612, T616, T610, T618, T760, T770, T820, and S8000 models. These chipsets are used in devices running Android 11. The vulnerability exists in the TeleService component, where a missing bounds check leads to a possible out-of-bounds read (CWE-125). This flaw can be exploited locally by an attacker with system execution privileges to cause a denial of service (DoS) condition by crashing the system or causing instability. The CVSS v3.1 base score is 4.4 (medium severity), with the vector indicating that the attack requires local access (AV:L), low attack complexity (AC:L), high privileges (PR:H), no user interaction (UI:N), and impacts availability only (A:H) without affecting confidentiality or integrity. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability does not allow remote exploitation or privilege escalation by itself but can be leveraged by a local attacker or malicious app with system-level privileges to disrupt device availability. The affected chipsets are commonly found in budget and mid-range smartphones, particularly those using Unisoc SoCs, which are prevalent in certain markets. The root cause is a missing bounds check in TeleService, which leads to reading memory outside the intended buffer, causing instability or crashes.

Potential Impact

For European organizations, the impact of CVE-2023-42726 is primarily related to device availability and operational continuity. Organizations using devices powered by the affected Unisoc chipsets running Android 11 could experience local denial of service conditions if the vulnerability is exploited. This could disrupt mobile communications, especially in environments where these devices are used for critical communication or mobile workforce operations. Although the vulnerability does not compromise confidentiality or integrity, the denial of service could impact business processes relying on mobile connectivity or device availability. The requirement for system execution privileges limits the attack surface to insiders or malware that has already gained high-level access, reducing the likelihood of widespread exploitation. However, in sectors such as telecommunications, logistics, or field services where Unisoc-based devices are deployed, this vulnerability could be leveraged to cause targeted disruptions. Additionally, the lack of patches means that affected devices remain vulnerable until vendors release updates, posing a risk for organizations with limited device management capabilities.

Mitigation Recommendations

To mitigate CVE-2023-42726, European organizations should: 1) Inventory and identify devices using the affected Unisoc chipsets running Android 11 to understand exposure. 2) Limit installation of apps requiring system-level privileges and enforce strict app vetting policies to prevent malicious apps from gaining system execution rights. 3) Monitor device behavior for signs of instability or crashes related to TeleService, which could indicate exploitation attempts. 4) Engage with device manufacturers and Unisoc to obtain timelines for patches or firmware updates and apply them promptly once available. 5) Where possible, upgrade devices to newer Android versions or hardware platforms not affected by this vulnerability. 6) Implement mobile device management (MDM) solutions that can enforce security policies and remotely manage vulnerable devices. 7) Educate users about the risks of granting elevated privileges to apps and the importance of installing updates. These steps go beyond generic advice by focusing on controlling privilege escalation paths and device management tailored to the affected chipsets and Android version.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Unisoc
Date Reserved
2023-09-13T07:40:40.036Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68386ba5182aa0cae2809bb8

Added to database: 5/29/2025, 2:13:57 PM

Last enriched: 7/8/2025, 2:26:48 AM

Last updated: 7/29/2025, 9:10:40 PM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats