Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11131: cwe-20 Improper Input Validation in Unisoc (Shanghai) Technologies Co., Ltd. T8100/T9100/T8200/T8300

0
High
VulnerabilityCVE-2025-11131cvecve-2025-11131cwe-20
Published: Mon Dec 01 2025 (12/01/2025, 07:35:52 UTC)
Source: CVE Database V5
Vendor/Project: Unisoc (Shanghai) Technologies Co., Ltd.
Product: T8100/T9100/T8200/T8300

Description

In nr modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service with no additional execution privileges needed

AI-Powered Analysis

AILast updated: 12/08/2025, 08:44:20 UTC

Technical Analysis

CVE-2025-11131 is a vulnerability identified in the NR (New Radio) modem component of Unisoc (Shanghai) Technologies Co., Ltd. chipsets T8100, T9100, T8200, and T8300. These chipsets are integrated into mobile devices running Android versions 13 through 16. The vulnerability stems from improper input validation (classified under CWE-20), where the NR modem fails to correctly validate incoming data. This flaw can be exploited remotely by an unauthenticated attacker without any user interaction to cause a system crash, leading to a denial of service (DoS) condition. The CVSS v3.1 score of 7.5 reflects the vulnerability’s network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), no impact on confidentiality or integrity (C:N/I:N), but high impact on availability (A:H). The vulnerability does not grant execution privileges or data access but disrupts device availability by crashing the modem subsystem. No patches or exploits are currently publicly available, but the risk remains significant due to the ease of exploitation and the critical role of the NR modem in mobile communications. This vulnerability could be leveraged to disrupt mobile services, impacting communication reliability and device usability.

Potential Impact

For European organizations, the primary impact of CVE-2025-11131 is the potential for remote denial of service attacks on mobile devices using affected Unisoc chipsets. This can lead to temporary loss of mobile connectivity, affecting business operations reliant on mobile communications, including remote work, field services, and IoT deployments. Critical sectors such as telecommunications, finance, healthcare, and public safety could experience disruptions if devices become unresponsive or lose network access. Additionally, widespread exploitation could strain mobile network operators by increasing support calls and device replacements. The lack of confidentiality or integrity compromise limits data breach risks, but availability impacts can degrade user experience and operational continuity. Organizations with mobile device fleets or BYOD policies should be particularly vigilant. The threat also extends to mobile network infrastructure relying on affected chipsets, potentially impacting network stability and service quality.

Mitigation Recommendations

To mitigate CVE-2025-11131, organizations should prioritize obtaining and deploying firmware and software updates from device manufacturers and Unisoc as soon as patches become available. In the interim, network operators and enterprises should implement network-level filtering to detect and block malformed or suspicious NR modem traffic patterns that could trigger the vulnerability. Device management solutions should monitor for abnormal device crashes or connectivity issues indicative of exploitation attempts. Employing mobile threat defense (MTD) tools can help detect anomalous modem behavior. Organizations should also review and restrict exposure of mobile devices to untrusted networks where possible, reducing the attack surface. Security teams should maintain awareness of vendor advisories and coordinate with mobile service providers to ensure rapid response. Finally, incorporating this vulnerability into incident response plans will help prepare for potential denial of service incidents affecting mobile assets.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Unisoc
Date Reserved
2025-09-28T06:59:26.085Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 692d4907e7f98a81a7fa7877

Added to database: 12/1/2025, 7:51:35 AM

Last enriched: 12/8/2025, 8:44:20 AM

Last updated: 1/18/2026, 8:12:38 AM

Views: 25

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats