Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11133: cwe-20 Improper Input Validation in Unisoc (Shanghai) Technologies Co., Ltd. T8100/T9100/T8200/T8300

0
High
VulnerabilityCVE-2025-11133cvecve-2025-11133cwe-20
Published: Mon Dec 01 2025 (12/01/2025, 07:35:54 UTC)
Source: CVE Database V5
Vendor/Project: Unisoc (Shanghai) Technologies Co., Ltd.
Product: T8100/T9100/T8200/T8300

Description

In nr modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service with no additional execution privileges needed

AI-Powered Analysis

AILast updated: 12/01/2025, 07:54:32 UTC

Technical Analysis

CVE-2025-11133 identifies a vulnerability in the 5G NR modem firmware of Unisoc (Shanghai) Technologies Co., Ltd.'s T8100, T9100, T8200, and T8300 chipsets. These chipsets are integrated into various Android devices running versions 13 through 16. The root cause is improper input validation (CWE-20) within the modem's processing of incoming data, which can be manipulated remotely by an attacker to trigger a system crash. This crash leads to a denial of service (DoS) condition, disrupting normal device operation. The vulnerability is exploitable over the network without requiring any privileges or user interaction, increasing the attack surface. The CVSS v3.1 score of 7.5 reflects a high severity due to the ease of exploitation and impact on availability, although confidentiality and integrity remain unaffected. No public exploits have been reported yet, but the potential for disruption in mobile communications is significant. The lack of available patches at the time of disclosure necessitates proactive monitoring and risk management. The vulnerability affects a broad range of Android versions, indicating a wide potential impact across devices using these chipsets. Given the critical role of modems in mobile connectivity, exploitation could degrade service quality or cause device reboots, impacting end users and enterprise operations reliant on mobile networks.

Potential Impact

For European organizations, the primary impact is on availability and operational continuity. Devices using affected Unisoc chipsets may experience unexpected crashes or reboots, leading to service interruptions. This is particularly critical for sectors relying on mobile communications such as telecommunications providers, emergency services, logistics, and remote workforce operations. Disruptions could affect mobile network reliability, degrade user experience, and potentially interrupt critical communications. While the vulnerability does not expose data confidentiality or integrity, the denial of service could indirectly impact business processes and customer trust. Enterprises deploying IoT devices or mobile endpoints with these chipsets may face increased downtime or require costly device replacements or firmware updates. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits post-disclosure. The impact is amplified in environments with high dependency on mobile connectivity and limited redundancy.

Mitigation Recommendations

1. Coordinate with device manufacturers and Unisoc to obtain and apply firmware or software patches as soon as they become available. 2. Implement network-level monitoring to detect unusual traffic patterns targeting modem interfaces, which may indicate exploitation attempts. 3. Employ mobile device management (MDM) solutions to enforce timely updates and monitor device health status. 4. For critical infrastructure, consider deploying fallback communication channels or redundant devices to maintain availability during potential disruptions. 5. Educate IT and security teams about this vulnerability to ensure rapid incident response if symptoms of exploitation appear. 6. Restrict exposure of vulnerable devices to untrusted networks where possible, using network segmentation or VPNs. 7. Engage with telecom providers to understand their mitigation strategies and coordinate on threat intelligence sharing. 8. Maintain an inventory of devices using affected chipsets to prioritize patching and monitoring efforts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Unisoc
Date Reserved
2025-09-28T07:20:05.625Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 692d4907e7f98a81a7fa787d

Added to database: 12/1/2025, 7:51:35 AM

Last enriched: 12/1/2025, 7:54:32 AM

Last updated: 12/3/2025, 12:13:37 PM

Views: 12

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats