First published: Wed Jan 04 2023(Updated: )
In network service, there is a missing permission check. This could lead to local escalation of privilege with System execution privileges needed.
Credit: security@unisoc.com
Affected Software | Affected Version | How to fix |
---|---|---|
Android | =10.0 | |
Android | =11.0 | |
Android | =12.0 | |
Unisoc S8000 Firmware | ||
Unisoc SC7731 | ||
Unisoc SC9832E Firmware | ||
Unisoc SC9863A Firmware | ||
Unisoc T310 | ||
Unisoc T606 | ||
Unisoc T610 | ||
Unisoc T612 | ||
Unisoc T616 | ||
UniSoc T618 | ||
Unisoc T760 Firmware | ||
Unisoc T770 | ||
Unisoc T820 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-39083 has a severity rating indicating a low to moderate risk due to the potential for local privilege escalation.
To fix CVE-2022-39083, ensure that you update your Android device to the latest version released by Google, which contains the necessary security patches.
CVE-2022-39083 affects Android versions 10.0, 11.0, and 12.0.
No, CVE-2022-39083 requires local access to the device to be exploited.
The impact of CVE-2022-39083 includes unauthorized access to system execution privileges which could allow an attacker to execute arbitrary commands.