CVE-2025-11131: cwe-20 Improper Input Validation in Unisoc (Shanghai) Technologies Co., Ltd. T8100/T9100/T8200/T8300
In nr modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service with no additional execution privileges needed
AI Analysis
Technical Summary
CVE-2025-11131 identifies a vulnerability in the NR (New Radio) modem component of Unisoc (Shanghai) Technologies Co., Ltd. chipsets T8100, T9100, T8200, and T8300. These chipsets are integrated into mobile devices running Android versions 13 through 16. The vulnerability stems from improper input validation (CWE-20) within the modem firmware or software stack, which can be triggered remotely without requiring any privileges or user interaction. Exploiting this flaw causes the modem system to crash, leading to a denial of service condition. The CVSS v3.1 score of 7.5 reflects a high severity level, primarily due to the network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N). The impact is limited to availability (A:H), with no confidentiality or integrity compromise. While no exploits have been observed in the wild, the vulnerability poses a risk to device stability and network reliability. The lack of available patches at the time of publication necessitates proactive defensive measures. Given the critical role of modems in mobile communications, this vulnerability could disrupt voice, data, and emergency services on affected devices.
Potential Impact
For European organizations, the primary impact is the potential for remote denial of service on devices using Unisoc T8100/T9100/T8200/T8300 chipsets, which could disrupt mobile communications and data connectivity. This is particularly critical for sectors relying on mobile networks for operational continuity, such as emergency services, healthcare, transportation, and critical infrastructure management. The disruption could lead to loss of communication capabilities, impacting business operations and safety. Since the vulnerability does not require authentication or user interaction, attackers could potentially target devices en masse, causing widespread service degradation. The impact on confidentiality and integrity is negligible; however, the availability impact could affect user productivity and organizational resilience. Organizations with mobile device fleets or IoT deployments using these chipsets should consider the risk of service interruptions and plan accordingly.
Mitigation Recommendations
1. Monitor Unisoc and device vendor advisories closely for the release of security patches addressing CVE-2025-11131 and apply updates promptly. 2. Where possible, restrict network exposure of devices with affected chipsets by implementing network segmentation and firewall rules to limit unsolicited NR modem traffic. 3. Employ mobile device management (MDM) solutions to identify and inventory devices using Unisoc T8100/T9100/T8200/T8300 chipsets and prioritize them for monitoring and patching. 4. For critical deployments, consider fallback or redundancy strategies to maintain communication availability in case of device crashes. 5. Collaborate with mobile network operators to understand the risk exposure and potential network-level mitigations. 6. Educate users and administrators about the symptoms of modem crashes and establish incident response procedures to quickly address service disruptions. 7. Evaluate the feasibility of temporarily disabling NR modem features if not essential, to reduce attack surface until patches are available.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden, Poland, Belgium, Finland
CVE-2025-11131: cwe-20 Improper Input Validation in Unisoc (Shanghai) Technologies Co., Ltd. T8100/T9100/T8200/T8300
Description
In nr modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service with no additional execution privileges needed
AI-Powered Analysis
Technical Analysis
CVE-2025-11131 identifies a vulnerability in the NR (New Radio) modem component of Unisoc (Shanghai) Technologies Co., Ltd. chipsets T8100, T9100, T8200, and T8300. These chipsets are integrated into mobile devices running Android versions 13 through 16. The vulnerability stems from improper input validation (CWE-20) within the modem firmware or software stack, which can be triggered remotely without requiring any privileges or user interaction. Exploiting this flaw causes the modem system to crash, leading to a denial of service condition. The CVSS v3.1 score of 7.5 reflects a high severity level, primarily due to the network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N). The impact is limited to availability (A:H), with no confidentiality or integrity compromise. While no exploits have been observed in the wild, the vulnerability poses a risk to device stability and network reliability. The lack of available patches at the time of publication necessitates proactive defensive measures. Given the critical role of modems in mobile communications, this vulnerability could disrupt voice, data, and emergency services on affected devices.
Potential Impact
For European organizations, the primary impact is the potential for remote denial of service on devices using Unisoc T8100/T9100/T8200/T8300 chipsets, which could disrupt mobile communications and data connectivity. This is particularly critical for sectors relying on mobile networks for operational continuity, such as emergency services, healthcare, transportation, and critical infrastructure management. The disruption could lead to loss of communication capabilities, impacting business operations and safety. Since the vulnerability does not require authentication or user interaction, attackers could potentially target devices en masse, causing widespread service degradation. The impact on confidentiality and integrity is negligible; however, the availability impact could affect user productivity and organizational resilience. Organizations with mobile device fleets or IoT deployments using these chipsets should consider the risk of service interruptions and plan accordingly.
Mitigation Recommendations
1. Monitor Unisoc and device vendor advisories closely for the release of security patches addressing CVE-2025-11131 and apply updates promptly. 2. Where possible, restrict network exposure of devices with affected chipsets by implementing network segmentation and firewall rules to limit unsolicited NR modem traffic. 3. Employ mobile device management (MDM) solutions to identify and inventory devices using Unisoc T8100/T9100/T8200/T8300 chipsets and prioritize them for monitoring and patching. 4. For critical deployments, consider fallback or redundancy strategies to maintain communication availability in case of device crashes. 5. Collaborate with mobile network operators to understand the risk exposure and potential network-level mitigations. 6. Educate users and administrators about the symptoms of modem crashes and establish incident response procedures to quickly address service disruptions. 7. Evaluate the feasibility of temporarily disabling NR modem features if not essential, to reduce attack surface until patches are available.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Unisoc
- Date Reserved
- 2025-09-28T06:59:26.085Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 692d4907e7f98a81a7fa7877
Added to database: 12/1/2025, 7:51:35 AM
Last enriched: 12/1/2025, 7:55:06 AM
Last updated: 12/4/2025, 12:29:33 PM
Views: 10
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14010: Vulnerability in Red Hat Red Hat Ceph Storage 5
MediumCVE-2025-12826: CWE-862 Missing Authorization in webdevstudios Custom Post Type UI
MediumCVE-2025-12782: CWE-862 Missing Authorization in beaverbuilder Beaver Builder Page Builder – Drag and Drop Website Builder
MediumCVE-2025-13513: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in codejunkie Clik stats
MediumCVE-2025-11727: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in codisto Omnichannel for WooCommerce: Google, Amazon, eBay & Walmart Integration – Powered by Codisto
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.