Vulnerability identifier: #VU70017
Vulnerability risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID:
CWE-ID:
CWE-787
Exploitation vector: Local
Exploit availability: No
Vulnerable software:
SC9863A
Mobile applications /
Mobile firmware & hardware
SC9832E
Mobile applications /
Mobile firmware & hardware
SC7731E
Mobile applications /
Mobile firmware & hardware
T610
Mobile applications /
Mobile firmware & hardware
T310
Mobile applications /
Mobile firmware & hardware
T606
Mobile applications /
Mobile firmware & hardware
T760
Mobile applications /
Mobile firmware & hardware
T618
Mobile applications /
Mobile firmware & hardware
T612
Mobile applications /
Mobile firmware & hardware
T616
Mobile applications /
Mobile firmware & hardware
T770
Mobile applications /
Mobile firmware & hardware
T820
Mobile applications /
Mobile firmware & hardware
S8023
Mobile applications /
Mobile firmware & hardware
Vendor: UNISOC
Description
The vulnerability allows a local application to perform a denial of service (DoS) attack.
The vulnerability exists due to a boundary error within the wlan driver driver. A local application can trigger an out-of-bounds write and crash the kernel.
Mitigation
Install updates from vendor's website.
Vulnerable software versions
SC9863A: All versions
SC9832E: All versions
SC7731E: All versions
T610: All versions
T310: All versions
T606: All versions
T760: All versions
T618: All versions
T612: All versions
T616: All versions
T770: All versions
T820: All versions
S8023: All versions
External links
http://www.unisoc.com/en_us/secy/announcementDetail/1599588060988411006
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.