CVE-2022-48390

7.8 HIGH

📋 TL;DR

CVE-2022-48390 is a missing permission check vulnerability in telephony services that allows local attackers to escalate privileges without requiring additional execution privileges. This affects Android devices with Unisoc chipsets, potentially allowing attackers to gain elevated system access.

💻 Affected Systems

Products:
  • Android devices with Unisoc chipsets
Versions: Android versions with vulnerable Unisoc telephony service implementation
Operating Systems: Android
Default Config Vulnerable: ⚠️ Yes
Notes: Specific Unisoc chipset models and Android versions require checking vendor advisories. Likely affects multiple device manufacturers using Unisoc chips.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker with local access could gain full system control, access sensitive telephony data, intercept calls/SMS, and potentially install persistent malware.

🟠

Likely Case

Local privilege escalation allowing access to telephony functions and system resources normally restricted to privileged apps.

🟢

If Mitigated

Limited impact with proper app sandboxing and SELinux policies in place, though telephony functions remain at risk.

🌐 Internet-Facing: LOW - Requires local access to device, not directly exploitable over network.
🏢 Internal Only: HIGH - Local attackers or malicious apps can exploit this without user interaction.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires local access but no special permissions. Likely exploitable by malicious apps or users with physical access.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check device manufacturer for specific security patch level

Vendor Advisory: https://www.unisoc.com/en_us/secy/announcementDetail/1664822361414762498

Restart Required: Yes

Instructions:

1. Check device manufacturer's security updates. 2. Apply latest Android security patch. 3. For Unisoc reference designs, apply vendor-provided patches. 4. Reboot device after update.

🔧 Temporary Workarounds

Restrict app permissions

android

Limit telephony permissions for untrusted apps to reduce attack surface

Disable unnecessary telephony services

android

Disable telephony features not in use if device supports it

🧯 If You Can't Patch

  • Isolate affected devices from sensitive networks and data
  • Implement strict app installation policies and only allow trusted sources

🔍 How to Verify

Check if Vulnerable:

Check Android security patch level in Settings > About phone > Android version. Compare with manufacturer's security bulletin.

Check Version:

adb shell getprop ro.build.version.security_patch

Verify Fix Applied:

Verify security patch level includes October 2022 or later patches. Check with manufacturer for specific patch information.

📡 Detection & Monitoring

Log Indicators:

  • Unusual telephony service access attempts
  • Permission denial logs for telephony services
  • SELinux denials related to telephony

Network Indicators:

  • Not applicable - local exploit only

SIEM Query:

source="android" AND (event="permission_denied" AND service="telephony") OR (event="selinux_denial" AND target="telephony_service")

🔗 References

📤 Share & Export