CVE-2021-39635

9.1 CRITICAL

📋 TL;DR

CVE-2021-39635 is a critical privilege escalation vulnerability in the ims_ex system service on Unisoc-powered Android devices. It allows unprivileged applications without phone permissions to access VoLTE sensitive information and manage VoLTE calls. This affects Android devices using Unisoc chipsets with vulnerable versions of the ims_ex service.

💻 Affected Systems

Products:
  • Android devices with Unisoc (Spreadtrum) chipsets
Versions: Android SoC versions with vulnerable ims_ex service implementation
Operating Systems: Android
Default Config Vulnerable: ⚠️ Yes
Notes: Specifically affects devices using Unisoc chipsets where the ims_ex service lacks proper permission checks. Not all Android devices are affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could intercept, redirect, or terminate VoLTE calls, access call metadata and sensitive VoLTE configuration data, potentially enabling surveillance or service disruption.

🟠

Likely Case

Malicious apps could silently collect VoLTE call information, manipulate call settings, or cause service instability without user knowledge.

🟢

If Mitigated

With proper permission validation, only system apps with appropriate permissions can access VoLTE management functions.

🌐 Internet-Facing: LOW (Exploitation requires local app installation, not directly internet-facing)
🏢 Internal Only: HIGH (Any malicious app on the device can exploit this without user interaction)

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires installing a malicious app on the target device. The vulnerability is straightforward to exploit once an app is installed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Android Security Bulletin February 2022 patches

Vendor Advisory: https://source.android.com/security/bulletin/2022-02-01

Restart Required: Yes

Instructions:

1. Check for Android security updates in device settings. 2. Install February 2022 or later security patches. 3. For OEM devices, check manufacturer's security updates. 4. Reboot device after update installation.

🔧 Temporary Workarounds

Restrict app installations

all

Only install apps from trusted sources like Google Play Store and avoid sideloading unknown apps

Review app permissions

all

Regularly audit installed apps and remove any suspicious or unnecessary applications

🧯 If You Can't Patch

  • Deploy mobile device management (MDM) to control app installations and monitor for suspicious behavior
  • Implement application allowlisting to prevent unauthorized apps from running on affected devices

🔍 How to Verify

Check if Vulnerable:

Check Android security patch level in Settings > About phone > Android version. If patch level is before February 2022 and device uses Unisoc chipset, it may be vulnerable.

Check Version:

adb shell getprop ro.build.version.security_patch

Verify Fix Applied:

Verify security patch level is February 2022 or later in Settings > About phone > Android version

📡 Detection & Monitoring

Log Indicators:

  • Unusual access to telephony services by non-system apps
  • Permission denial logs for ims_ex service access attempts

Network Indicators:

  • Abnormal VoLTE call patterns or configurations

SIEM Query:

source="android_logs" AND (process="ims_ex" OR service="ims_ex") AND action="access" AND result="granted" AND caller_package NOT IN (system_apps)

🔗 References

📤 Share & Export