Multiple vulnerabilities in Unisoc chipsets



Published: 2021-09-05 | Updated: 2023-03-07
Risk Medium
Patch available YES
Number of vulnerabilities 2
CVE-ID CVE-2021-0636
CVE-2021-0635
CWE-ID CWE-119
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
SC9863A
Mobile applications / Mobile firmware & hardware

SC9832E
Mobile applications / Mobile firmware & hardware

SC7731E
Mobile applications / Mobile firmware & hardware

UMS512
Mobile applications / Mobile firmware & hardware

UMS312
Mobile applications / Mobile firmware & hardware

UMS9230
Mobile applications / Mobile firmware & hardware

UMS9620
Mobile applications / Mobile firmware & hardware

Vendor UNISOC

Security Bulletin

This security bulletin contains information about 2 vulnerabilities.

1) Memory corruption

EUVDB-ID: #VU72896

Risk: Medium

CVSSv3.1: 6.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L/E:F/RC:C/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-0636

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a remote attacker to read, manipulate or delete data.

The vulnerability exists due to improper input validation within the Kernel. A remote attacker can read, manipulate or delete data.

Mitigation

Install security update from vendor's website.

Vulnerable software versions

SC9863A: All versions

SC9832E: All versions

SC7731E: All versions

UMS512: All versions

UMS312: All versions

UMS9230: All versions

UMS9620: All versions

CPE2.3 External links

http://www.unisoc.com/en_us/secy/announcementDetail/1532207829736296450


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Memory corruption

EUVDB-ID: #VU72897

Risk: Medium

CVSSv3.1: 6.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L/E:F/RC:C/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-0635

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a remote attacker to read, manipulate or delete data.

The vulnerability exists due to improper input validation within the Kernel. A remote attacker can read, manipulate or delete data.

Mitigation

Install security update from vendor's website.

Vulnerable software versions

SC9863A: All versions

SC9832E: All versions

SC7731E: All versions

UMS512: All versions

UMS312: All versions

UMS9230: All versions

UMS9620: All versions

CPE2.3 External links

http://www.unisoc.com/en_us/secy/announcementDetail/1532207829736296450


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###