CVE-2022-47361

7.8 HIGH

📋 TL;DR

CVE-2022-47361 is a missing permission check vulnerability in firewall services that allows local attackers to escalate privileges. Attackers need system execution privileges initially, but can then gain higher privileges. This affects systems running vulnerable firewall services from the affected vendor.

💻 Affected Systems

Products:
  • Unisoc firewall services
Versions: Specific versions not detailed in references; check vendor advisory for exact affected versions
Operating Systems: Android-based systems using Unisoc chipsets
Default Config Vulnerable: ⚠️ Yes
Notes: Affects systems with Unisoc chipsets running vulnerable firewall services. The vulnerability exists in the permission validation mechanism.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise where an attacker with initial system execution privileges gains full administrative control over the device, potentially installing persistent malware or accessing sensitive data.

🟠

Likely Case

Local privilege escalation allowing attackers to bypass security controls, modify system configurations, or access restricted resources they shouldn't have permission to access.

🟢

If Mitigated

Limited impact with proper access controls and monitoring in place, where privilege escalation attempts are detected and blocked before causing significant damage.

🌐 Internet-Facing: LOW - This is a local privilege escalation vulnerability requiring initial system execution privileges, making direct internet exploitation unlikely.
🏢 Internal Only: HIGH - Significant risk from insider threats or compromised accounts with system execution privileges that could escalate to full system control.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access and initial system execution privileges. The missing permission check makes exploitation straightforward once initial access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisory for specific patched versions

Vendor Advisory: https://www.unisoc.com/en_us/secy/announcementDetail/1621031430231134210

Restart Required: Yes

Instructions:

1. Check the vendor advisory for affected versions. 2. Apply the security patch provided by Unisoc. 3. Restart the device to ensure the patch is fully applied. 4. Verify the fix using version checks.

🔧 Temporary Workarounds

Restrict system execution privileges

all

Limit which users and processes have system execution privileges to reduce attack surface

Review and modify system permissions using appropriate OS-specific security policies

Implement strict access controls

linux

Enforce principle of least privilege for all system accounts and services

Configure mandatory access controls (e.g., SELinux, AppArmor) where available

🧯 If You Can't Patch

  • Implement strict monitoring for privilege escalation attempts and unusual system activity
  • Isolate affected systems from critical network segments and implement network segmentation

🔍 How to Verify

Check if Vulnerable:

Check system version against vendor advisory and examine firewall service permissions

Check Version:

Check device firmware/software version in system settings or using manufacturer-specific commands

Verify Fix Applied:

Verify that the security patch has been applied and test privilege escalation attempts to confirm they are blocked

📡 Detection & Monitoring

Log Indicators:

  • Unusual privilege escalation attempts in system logs
  • Firewall service permission modification events
  • Unexpected system process execution with elevated privileges

Network Indicators:

  • Unusual outbound connections from system processes
  • Unexpected network configuration changes

SIEM Query:

source="system_logs" AND (event_type="privilege_escalation" OR process_name="firewall_service") AND result="success"

🔗 References

📤 Share & Export