Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11131: cwe-20 Improper Input Validation in Unisoc (Shanghai) Technologies Co., Ltd. T8100/T9100/T8200/T8300

0
High
VulnerabilityCVE-2025-11131cvecve-2025-11131cwe-20
Published: Mon Dec 01 2025 (12/01/2025, 07:35:52 UTC)
Source: CVE Database V5
Vendor/Project: Unisoc (Shanghai) Technologies Co., Ltd.
Product: T8100/T9100/T8200/T8300

Description

In nr modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service with no additional execution privileges needed

AI-Powered Analysis

AILast updated: 12/01/2025, 07:55:06 UTC

Technical Analysis

CVE-2025-11131 identifies a vulnerability in the NR (New Radio) modem component of Unisoc (Shanghai) Technologies Co., Ltd. chipsets T8100, T9100, T8200, and T8300. These chipsets are integrated into mobile devices running Android versions 13 through 16. The vulnerability stems from improper input validation (CWE-20) within the modem firmware or software stack, which can be triggered remotely without requiring any privileges or user interaction. Exploiting this flaw causes the modem system to crash, leading to a denial of service condition. The CVSS v3.1 score of 7.5 reflects a high severity level, primarily due to the network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N). The impact is limited to availability (A:H), with no confidentiality or integrity compromise. While no exploits have been observed in the wild, the vulnerability poses a risk to device stability and network reliability. The lack of available patches at the time of publication necessitates proactive defensive measures. Given the critical role of modems in mobile communications, this vulnerability could disrupt voice, data, and emergency services on affected devices.

Potential Impact

For European organizations, the primary impact is the potential for remote denial of service on devices using Unisoc T8100/T9100/T8200/T8300 chipsets, which could disrupt mobile communications and data connectivity. This is particularly critical for sectors relying on mobile networks for operational continuity, such as emergency services, healthcare, transportation, and critical infrastructure management. The disruption could lead to loss of communication capabilities, impacting business operations and safety. Since the vulnerability does not require authentication or user interaction, attackers could potentially target devices en masse, causing widespread service degradation. The impact on confidentiality and integrity is negligible; however, the availability impact could affect user productivity and organizational resilience. Organizations with mobile device fleets or IoT deployments using these chipsets should consider the risk of service interruptions and plan accordingly.

Mitigation Recommendations

1. Monitor Unisoc and device vendor advisories closely for the release of security patches addressing CVE-2025-11131 and apply updates promptly. 2. Where possible, restrict network exposure of devices with affected chipsets by implementing network segmentation and firewall rules to limit unsolicited NR modem traffic. 3. Employ mobile device management (MDM) solutions to identify and inventory devices using Unisoc T8100/T9100/T8200/T8300 chipsets and prioritize them for monitoring and patching. 4. For critical deployments, consider fallback or redundancy strategies to maintain communication availability in case of device crashes. 5. Collaborate with mobile network operators to understand the risk exposure and potential network-level mitigations. 6. Educate users and administrators about the symptoms of modem crashes and establish incident response procedures to quickly address service disruptions. 7. Evaluate the feasibility of temporarily disabling NR modem features if not essential, to reduce attack surface until patches are available.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Unisoc
Date Reserved
2025-09-28T06:59:26.085Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 692d4907e7f98a81a7fa7877

Added to database: 12/1/2025, 7:51:35 AM

Last enriched: 12/1/2025, 7:55:06 AM

Last updated: 12/4/2025, 12:29:33 PM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats