UNISOC, a semiconductor company based in Shanghai, is the world’s fourth-largest mobile processor manufacturer after Mediatek, Qualcomm, and Apple, accounting for 10% of all SoC shipments in Q3 2021, according to Counterpoint Research. The now-patched issue has been assigned the identifier CVE-2022-20210 and is rated 9.4 out of 10 for severity on the CVSS vulnerability scoring system.
A serious security weakness in UNISOC’s smartphone chipset has been discovered, which might be used to interrupt a smartphone’s radio connections by sending a faulty packet. In a research published with The Hacker News, Israeli cybersecurity firm Check Point stated, “If left unpatched, a hacker or a military force can utilise such a weakness to disable communications in a specific place.” “The flaw is in the modem firmware, not the Android operating system.”
“An attacker could have used a radio station to send a malformed packet that would reset the modem, depriving the user of the possibility of communication,” Check Point’s Slava Makkaveev said. Found this article interesting? Follow THN on Facebook, Twitter and LinkedIn to read more exclusive content we post.
In a nutshell, the vulnerability — discovered following a reverse-engineering of UNISOC’s LTE protocol stack implementation — relates to a case of buffer overflow vulnerability in the component that handles Non-Access Stratum (NAS) messages in the modem firmware, resulting in denial-of-service. To mitigate the risk, it’s recommended that users update their Android devices to the latest available software as and when it becomes available as part of Google’s Android Security Bulletin for June 2022.