CVE-2022-47338

7.1 HIGH

📋 TL;DR

CVE-2022-47338 is a missing permission check vulnerability in telecom services that allows local attackers to cause denial of service. This affects devices running vulnerable telecom service implementations, primarily impacting mobile devices and telecom infrastructure components. Attackers need local access to exploit this vulnerability.

💻 Affected Systems

Products:
  • Unisoc telecom service implementations
  • Devices using Unisoc chipsets with vulnerable telecom services
Versions: Specific versions not publicly detailed; affected versions prior to vendor patches
Operating Systems: Android-based systems, Embedded telecom systems
Default Config Vulnerable: ⚠️ Yes
Notes: Affects telecom service components in devices using Unisoc chipsets; exact device models not specified in public advisories.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete disruption of telecom services on affected devices, preventing voice calls, SMS, and data services until service restart or device reboot.

🟠

Likely Case

Temporary service disruption requiring manual intervention to restore telecom functionality, potentially affecting multiple users on shared infrastructure.

🟢

If Mitigated

Minimal impact with proper access controls and monitoring in place, allowing quick detection and remediation of exploitation attempts.

🌐 Internet-Facing: LOW - Requires local access to exploit; not directly exploitable over the internet.
🏢 Internal Only: MEDIUM - Local attackers or malicious insiders could disrupt telecom services affecting business communications.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access but minimal technical skill once access is obtained; no public exploit code available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Vendor-specific patches; check with device manufacturers for specific versions

Vendor Advisory: https://www.unisoc.com/en_us/secy/announcementDetail/1645429273135218690

Restart Required: Yes

Instructions:

1. Contact device manufacturer for patch availability. 2. Apply vendor-provided security updates. 3. Reboot device after patch installation. 4. Verify telecom services are functioning normally.

🔧 Temporary Workarounds

Restrict local access

all

Limit physical and logical access to devices to prevent local exploitation

Monitor telecom service health

all

Implement monitoring for telecom service disruptions and restart services if needed

🧯 If You Can't Patch

  • Implement strict access controls to prevent unauthorized local access to devices
  • Deploy monitoring and alerting for telecom service disruptions with rapid response procedures

🔍 How to Verify

Check if Vulnerable:

Check device manufacturer security bulletins for affected models and versions; review telecom service logs for unexpected permission errors

Check Version:

Device-specific commands vary by manufacturer; typically in Settings > About Phone > Software Information

Verify Fix Applied:

Verify patch installation through device settings or manufacturer tools; test telecom services (calls, SMS, data) after patching

📡 Detection & Monitoring

Log Indicators:

  • Unexpected telecom service crashes
  • Permission denial errors in telecom service logs
  • Repeated service restarts

Network Indicators:

  • Sudden loss of telecom services on multiple devices
  • Abnormal service interruption patterns

SIEM Query:

source="telecom_service" AND (event="crash" OR event="permission_denied")

🔗 References

📤 Share & Export