Skip to main content

CVE-2023-42736: Vulnerability in Unisoc (Shanghai) Technologies Co., Ltd. SC7731E/SC9832E/SC9863A/T310/T606/T612/T616/T610/T618/T760/T770/T820/S8000

High
VulnerabilityCVE-2023-42736cvecve-2023-42736
Published: Mon Dec 04 2023 (12/04/2023, 00:54:21 UTC)
Source: CVE Database V5
Vendor/Project: Unisoc (Shanghai) Technologies Co., Ltd.
Product: SC7731E/SC9832E/SC9863A/T310/T606/T612/T616/T610/T618/T760/T770/T820/S8000

Description

In telecom service, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed

AI-Powered Analysis

AILast updated: 07/08/2025, 02:27:06 UTC

Technical Analysis

CVE-2023-42736 is a high-severity vulnerability identified in multiple Unisoc (Shanghai) Technologies Co., Ltd. chipsets, including SC7731E, SC9832E, SC9863A, and several others (T310, T606, T612, T616, T610, T618, T760, T770, T820, S8000). These chipsets are commonly embedded in Android devices running versions 11, 12, and 13. The vulnerability arises from a missing permission check within the telecom service component of the affected devices. This flaw allows a local attacker, who already has limited privileges on the device, to escalate their privileges without requiring additional execution privileges or user interaction. The CVSS v3.1 base score is 7.8, indicating a high severity level, with impacts rated as high on confidentiality, integrity, and availability. The vulnerability is classified under CWE-862 (Missing Authorization). Although no public exploits have been reported in the wild yet, the nature of the flaw suggests that an attacker with local access could leverage it to gain elevated control over the device, potentially compromising sensitive data, altering system configurations, or disrupting device operations. The absence of a patch link implies that fixes may still be pending or in development. Given the broad range of affected chipsets and Android versions, this vulnerability poses a significant risk to devices using Unisoc chipsets, which are prevalent in budget and mid-range smartphones globally.

Potential Impact

For European organizations, the impact of CVE-2023-42736 could be substantial, especially for those relying on mobile devices powered by Unisoc chipsets. The vulnerability enables local privilege escalation, which could be exploited by malicious insiders, compromised applications, or attackers with physical access to devices. This could lead to unauthorized access to corporate data, interception or manipulation of communications, and potential disruption of mobile device functionality. Organizations with Bring Your Own Device (BYOD) policies or those deploying Unisoc-based devices in their workforce may face increased risk of data breaches or operational interruptions. Furthermore, sectors with high security requirements such as finance, healthcare, and government agencies could be particularly vulnerable if attackers leverage this flaw to bypass security controls. The lack of user interaction requirement increases the risk of stealthy exploitation. Although no known exploits are currently in the wild, the high CVSS score and the nature of the vulnerability warrant proactive mitigation to prevent potential targeted attacks.

Mitigation Recommendations

1. Device Inventory and Assessment: Identify all devices within the organization that utilize Unisoc chipsets listed in the vulnerability report and verify their Android versions. 2. Firmware and OS Updates: Monitor Unisoc and device manufacturers for patches addressing CVE-2023-42736 and apply updates promptly once available. 3. Restrict Local Access: Enforce strict physical security controls and device usage policies to minimize the risk of unauthorized local access to devices. 4. Application Whitelisting and Privilege Management: Limit installation of untrusted applications and enforce least privilege principles to reduce the attack surface. 5. Mobile Device Management (MDM): Utilize MDM solutions to enforce security policies, monitor device integrity, and remotely wipe or quarantine compromised devices. 6. User Awareness and Training: Educate users on the risks of local privilege escalation and the importance of reporting lost or suspicious devices immediately. 7. Network Segmentation: Isolate mobile devices handling sensitive data from critical network segments to limit potential lateral movement in case of compromise. 8. Incident Response Preparedness: Develop and test incident response plans specific to mobile device compromises involving privilege escalation vulnerabilities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Unisoc
Date Reserved
2023-09-13T07:40:40.045Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68386ba5182aa0cae2809bba

Added to database: 5/29/2025, 2:13:57 PM

Last enriched: 7/8/2025, 2:27:06 AM

Last updated: 8/11/2025, 6:45:37 AM

Views: 16

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats