CVE-2022-47338
📋 TL;DR
CVE-2022-47338 is a missing permission check vulnerability in telecom services that allows local attackers to cause denial of service. This affects devices running vulnerable telecom service implementations, primarily impacting mobile devices and telecom infrastructure components. Attackers need local access to exploit this vulnerability.
💻 Affected Systems
- Unisoc telecom service implementations
- Devices using Unisoc chipsets with vulnerable telecom services
📦 What is this software?
Android by Google
Android by Google
⚠️ Risk & Real-World Impact
Worst Case
Complete disruption of telecom services on affected devices, preventing voice calls, SMS, and data services until service restart or device reboot.
Likely Case
Temporary service disruption requiring manual intervention to restore telecom functionality, potentially affecting multiple users on shared infrastructure.
If Mitigated
Minimal impact with proper access controls and monitoring in place, allowing quick detection and remediation of exploitation attempts.
🎯 Exploit Status
Exploitation requires local access but minimal technical skill once access is obtained; no public exploit code available.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Vendor-specific patches; check with device manufacturers for specific versions
Vendor Advisory: https://www.unisoc.com/en_us/secy/announcementDetail/1645429273135218690
Restart Required: Yes
Instructions:
1. Contact device manufacturer for patch availability. 2. Apply vendor-provided security updates. 3. Reboot device after patch installation. 4. Verify telecom services are functioning normally.
🔧 Temporary Workarounds
Restrict local access
allLimit physical and logical access to devices to prevent local exploitation
Monitor telecom service health
allImplement monitoring for telecom service disruptions and restart services if needed
🧯 If You Can't Patch
- Implement strict access controls to prevent unauthorized local access to devices
- Deploy monitoring and alerting for telecom service disruptions with rapid response procedures
🔍 How to Verify
Check if Vulnerable:
Check device manufacturer security bulletins for affected models and versions; review telecom service logs for unexpected permission errors
Check Version:
Device-specific commands vary by manufacturer; typically in Settings > About Phone > Software Information
Verify Fix Applied:
Verify patch installation through device settings or manufacturer tools; test telecom services (calls, SMS, data) after patching
📡 Detection & Monitoring
Log Indicators:
- Unexpected telecom service crashes
- Permission denial errors in telecom service logs
- Repeated service restarts
Network Indicators:
- Sudden loss of telecom services on multiple devices
- Abnormal service interruption patterns
SIEM Query:
source="telecom_service" AND (event="crash" OR event="permission_denied")