Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11132: cwe-20 Improper Input Validation in Unisoc (Shanghai) Technologies Co., Ltd. T8100/T9100/T8200/T8300

0
High
VulnerabilityCVE-2025-11132cvecve-2025-11132cwe-20
Published: Mon Dec 01 2025 (12/01/2025, 07:35:53 UTC)
Source: CVE Database V5
Vendor/Project: Unisoc (Shanghai) Technologies Co., Ltd.
Product: T8100/T9100/T8200/T8300

Description

In nr modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service with no additional execution privileges needed

AI-Powered Analysis

AILast updated: 12/01/2025, 07:54:51 UTC

Technical Analysis

CVE-2025-11132 is a vulnerability identified in the NR (New Radio) modem firmware of Unisoc (Shanghai) Technologies Co., Ltd. chipsets, specifically the T8100, T9100, T8200, and T8300 models. These chipsets are integrated into mobile devices running Android versions 13 through 16. The root cause is improper input validation (CWE-20) within the modem's processing of network data, which can be exploited remotely by an attacker to trigger a system crash. This crash leads to a denial of service (DoS) condition on the affected device, disrupting its availability. The attack vector is network-based (AV:N), requiring no privileges (PR:N) or user interaction (UI:N), making exploitation relatively straightforward. The vulnerability does not compromise confidentiality or integrity but severely impacts availability (A:H). No patches have been publicly released at the time of publication, and no known exploits are reported in the wild. The vulnerability was reserved on 2025-09-28 and published on 2025-12-01. The CVSS v3.1 base score is 7.5, categorizing it as high severity. The affected products are commonly used in mobile devices, particularly in markets where Unisoc chipsets have significant penetration. The vulnerability could be exploited by sending specially crafted network packets to the modem, causing it to mishandle input and crash the system. This could disrupt mobile communications, impacting both consumer and enterprise users relying on these devices for connectivity.

Potential Impact

For European organizations, the primary impact of CVE-2025-11132 is the potential disruption of mobile communications due to denial of service on devices using affected Unisoc chipsets. This can affect employees relying on mobile devices for critical communications, remote work, and access to corporate resources. Telecommunications providers using infrastructure or customer premises equipment with these chipsets may experience service outages or degraded network performance. The lack of confidentiality or integrity impact limits data breach risks, but availability loss can cause operational disruptions, especially in sectors dependent on continuous connectivity such as finance, healthcare, and emergency services. Additionally, the ease of remote exploitation without authentication increases the risk of widespread attacks, potentially targeting high-profile organizations or critical infrastructure. The absence of known exploits currently provides a window for proactive mitigation, but the high severity score and network attack vector necessitate urgent attention.

Mitigation Recommendations

1. Monitor vendor communications closely for official patches or firmware updates addressing CVE-2025-11132 and apply them promptly once available. 2. Implement network-level filtering to detect and block malformed or suspicious packets targeting the NR modem interfaces, potentially using deep packet inspection tools tailored for mobile network protocols. 3. Employ anomaly detection systems to monitor for unusual modem behavior or frequent crashes indicative of exploitation attempts. 4. For enterprise mobile device management (MDM), enforce policies to restrict device usage to trusted networks and limit exposure to untrusted or public networks where exploitation risk is higher. 5. Coordinate with mobile network operators to understand if they can implement protective measures at the network infrastructure level to mitigate attack vectors. 6. Educate users about the importance of installing updates and reporting device instability promptly. 7. Consider device replacement or alternative hardware for critical roles if patches are delayed or unavailable. 8. Conduct penetration testing and vulnerability assessments focusing on mobile device modems to identify potential exploitation paths and validate mitigations.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Unisoc
Date Reserved
2025-09-28T07:11:04.850Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 692d4907e7f98a81a7fa787a

Added to database: 12/1/2025, 7:51:35 AM

Last enriched: 12/1/2025, 7:54:51 AM

Last updated: 12/4/2025, 1:14:50 AM

Views: 14

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats