CVE-2023-42745

7.8 HIGH

📋 TL;DR

This CVE describes a missing permission check vulnerability in telecom services that could allow local attackers to escalate privileges without needing additional execution privileges. It affects systems running vulnerable telecom service components, potentially impacting devices and infrastructure using affected Unisoc implementations.

💻 Affected Systems

Products:
  • Unisoc telecom service components
Versions: Specific versions not detailed in provided references; check vendor advisory for exact affected versions
Operating Systems: Android-based systems using Unisoc chipsets
Default Config Vulnerable: ⚠️ Yes
Notes: Affects telecom service implementations on devices with Unisoc chipsets; exact device models would need verification from vendor.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker with local access could gain root/system-level privileges, potentially compromising the entire device, accessing sensitive data, or establishing persistence.

🟠

Likely Case

Local users or malicious apps could elevate privileges to access restricted functions or data they shouldn't normally have access to.

🟢

If Mitigated

With proper access controls and isolation, impact would be limited to the compromised user context without system-wide compromise.

🌐 Internet-Facing: LOW - This is a local privilege escalation requiring local access to exploit.
🏢 Internal Only: HIGH - Any local user or application could potentially exploit this vulnerability to gain elevated privileges.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access but no special permissions; complexity is low once local access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisory for specific patched versions

Vendor Advisory: https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049

Restart Required: Yes

Instructions:

1. Check vendor advisory for affected versions. 2. Apply security updates from device manufacturer or carrier. 3. Reboot device after update installation.

🔧 Temporary Workarounds

Restrict local access

all

Limit physical and logical access to devices to reduce attack surface

Application sandboxing

android

Ensure applications run with minimal necessary permissions

🧯 If You Can't Patch

  • Implement strict access controls to limit who has local device access
  • Monitor for suspicious privilege escalation attempts and unauthorized system modifications

🔍 How to Verify

Check if Vulnerable:

Check device manufacturer security bulletins or contact vendor to determine if specific device/model is affected

Check Version:

On Android: Settings > About phone > Android version/Security patch level

Verify Fix Applied:

Verify security patch level is updated beyond vulnerable versions; check with device manufacturer for specific patch verification

📡 Detection & Monitoring

Log Indicators:

  • Unexpected privilege escalation events
  • Telecom service permission violations
  • Unauthorized access to protected system functions

Network Indicators:

  • Local privilege escalation typically doesn't generate network traffic

SIEM Query:

Search for telephony service permission failures or unexpected UID/GID changes in system logs

🔗 References

📤 Share & Export