Skip to main content

CVE-2023-42747: Vulnerability in Unisoc (Shanghai) Technologies Co., Ltd. SC7731E/SC9832E/SC9863A/T310/T606/T612/T616/T610/T618/T760/T770/T820/S8000

High
VulnerabilityCVE-2023-42747cvecve-2023-42747
Published: Mon Dec 04 2023 (12/04/2023, 00:54:24 UTC)
Source: CVE Database V5
Vendor/Project: Unisoc (Shanghai) Technologies Co., Ltd.
Product: SC7731E/SC9832E/SC9863A/T310/T606/T612/T616/T610/T618/T760/T770/T820/S8000

Description

In camera service, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed

AI-Powered Analysis

AILast updated: 07/08/2025, 02:27:33 UTC

Technical Analysis

CVE-2023-42747 is a high-severity local privilege escalation vulnerability affecting multiple Unisoc (Shanghai) Technologies Co., Ltd. chipsets, including SC7731E, SC9832E, SC9863A, and several T-series models (T310, T606, T612, T616, T610, T618, T760, T770, T820, S8000). These chipsets are commonly integrated into Android devices running Android versions 11, 12, and 13. The vulnerability arises from a missing permission check within the camera service component of the affected devices. Specifically, this flaw allows a local attacker with limited privileges (low-level privileges) to escalate their privileges without requiring additional execution privileges or user interaction. The vulnerability is classified under CWE-862 (Missing Authorization), indicating that the camera service fails to properly verify whether the calling process has the appropriate permissions before granting access or performing sensitive operations. The CVSS v3.1 base score is 7.8, reflecting a high severity due to the combination of local attack vector, low attack complexity, required privileges, and the significant impact on confidentiality, integrity, and availability. Although no known exploits are reported in the wild yet, the vulnerability's nature suggests that an attacker who already has local access to the device (e.g., through a malicious app or compromised user account) could leverage this flaw to gain elevated privileges, potentially leading to full device compromise or unauthorized access to sensitive camera data and system functions. The absence of patches at the time of publication increases the urgency for affected parties to implement mitigations and monitor for updates from Unisoc or device manufacturers.

Potential Impact

For European organizations, the impact of CVE-2023-42747 can be significant, especially for those relying on mobile devices or embedded systems powered by Unisoc chipsets. The vulnerability enables local privilege escalation, which can be exploited by malicious insiders or malware that has already gained limited access to a device. This can lead to unauthorized access to sensitive information captured by the camera, manipulation or disruption of device functions, and potentially full device compromise. In sectors such as finance, healthcare, and government, where data confidentiality and device integrity are paramount, exploitation could result in data breaches, espionage, or disruption of critical services. Additionally, organizations with bring-your-own-device (BYOD) policies may face increased risk if employees' devices are affected, potentially serving as entry points for lateral movement within corporate networks. The lack of user interaction requirement further lowers the barrier for exploitation once local access is achieved. Although the vulnerability requires local access, the widespread use of vulnerable Android versions and Unisoc chipsets in cost-effective smartphones and IoT devices increases the attack surface. The absence of known exploits in the wild currently reduces immediate risk but does not preclude future exploitation, emphasizing the need for proactive mitigation.

Mitigation Recommendations

1. Monitor for official patches or firmware updates from Unisoc and device manufacturers and apply them promptly once available. 2. Restrict installation of untrusted or unverified applications on devices using Unisoc chipsets to reduce the risk of local attackers gaining initial access. 3. Employ mobile device management (MDM) solutions to enforce security policies, including application whitelisting and privilege restrictions. 4. Disable or restrict camera service access where feasible, especially on devices used in sensitive environments, to limit exposure. 5. Conduct regular security audits and vulnerability assessments on mobile devices within the organization to detect potential exploitation attempts. 6. Educate users about the risks of installing apps from unknown sources and the importance of device security hygiene. 7. Implement endpoint detection and response (EDR) tools capable of monitoring for suspicious local privilege escalation behaviors on mobile devices. 8. For IoT deployments using affected chipsets, isolate devices on segmented networks and monitor traffic for anomalies to contain potential compromises.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Unisoc
Date Reserved
2023-09-13T07:40:40.046Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68386ba5182aa0cae2809bbc

Added to database: 5/29/2025, 2:13:57 PM

Last enriched: 7/8/2025, 2:27:33 AM

Last updated: 8/18/2025, 7:10:35 AM

Views: 17

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats