CVE-2025-11133: cwe-20 Improper Input Validation in Unisoc (Shanghai) Technologies Co., Ltd. T8100/T9100/T8200/T8300
In nr modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service with no additional execution privileges needed
AI Analysis
Technical Summary
CVE-2025-11133 identifies a vulnerability in the 5G NR modem firmware of Unisoc (Shanghai) Technologies Co., Ltd.'s T8100, T9100, T8200, and T8300 chipsets. These chipsets are integrated into various Android devices running versions 13 through 16. The root cause is improper input validation (CWE-20) within the modem's processing of incoming data, which can be manipulated remotely by an attacker to trigger a system crash. This crash leads to a denial of service (DoS) condition, disrupting normal device operation. The vulnerability is exploitable over the network without requiring any privileges or user interaction, increasing the attack surface. The CVSS v3.1 score of 7.5 reflects a high severity due to the ease of exploitation and impact on availability, although confidentiality and integrity remain unaffected. No public exploits have been reported yet, but the potential for disruption in mobile communications is significant. The lack of available patches at the time of disclosure necessitates proactive monitoring and risk management. The vulnerability affects a broad range of Android versions, indicating a wide potential impact across devices using these chipsets. Given the critical role of modems in mobile connectivity, exploitation could degrade service quality or cause device reboots, impacting end users and enterprise operations reliant on mobile networks.
Potential Impact
For European organizations, the primary impact is on availability and operational continuity. Devices using affected Unisoc chipsets may experience unexpected crashes or reboots, leading to service interruptions. This is particularly critical for sectors relying on mobile communications such as telecommunications providers, emergency services, logistics, and remote workforce operations. Disruptions could affect mobile network reliability, degrade user experience, and potentially interrupt critical communications. While the vulnerability does not expose data confidentiality or integrity, the denial of service could indirectly impact business processes and customer trust. Enterprises deploying IoT devices or mobile endpoints with these chipsets may face increased downtime or require costly device replacements or firmware updates. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits post-disclosure. The impact is amplified in environments with high dependency on mobile connectivity and limited redundancy.
Mitigation Recommendations
1. Coordinate with device manufacturers and Unisoc to obtain and apply firmware or software patches as soon as they become available. 2. Implement network-level monitoring to detect unusual traffic patterns targeting modem interfaces, which may indicate exploitation attempts. 3. Employ mobile device management (MDM) solutions to enforce timely updates and monitor device health status. 4. For critical infrastructure, consider deploying fallback communication channels or redundant devices to maintain availability during potential disruptions. 5. Educate IT and security teams about this vulnerability to ensure rapid incident response if symptoms of exploitation appear. 6. Restrict exposure of vulnerable devices to untrusted networks where possible, using network segmentation or VPNs. 7. Engage with telecom providers to understand their mitigation strategies and coordinate on threat intelligence sharing. 8. Maintain an inventory of devices using affected chipsets to prioritize patching and monitoring efforts.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden, Belgium, Finland
CVE-2025-11133: cwe-20 Improper Input Validation in Unisoc (Shanghai) Technologies Co., Ltd. T8100/T9100/T8200/T8300
Description
In nr modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service with no additional execution privileges needed
AI-Powered Analysis
Technical Analysis
CVE-2025-11133 identifies a vulnerability in the 5G NR modem firmware of Unisoc (Shanghai) Technologies Co., Ltd.'s T8100, T9100, T8200, and T8300 chipsets. These chipsets are integrated into various Android devices running versions 13 through 16. The root cause is improper input validation (CWE-20) within the modem's processing of incoming data, which can be manipulated remotely by an attacker to trigger a system crash. This crash leads to a denial of service (DoS) condition, disrupting normal device operation. The vulnerability is exploitable over the network without requiring any privileges or user interaction, increasing the attack surface. The CVSS v3.1 score of 7.5 reflects a high severity due to the ease of exploitation and impact on availability, although confidentiality and integrity remain unaffected. No public exploits have been reported yet, but the potential for disruption in mobile communications is significant. The lack of available patches at the time of disclosure necessitates proactive monitoring and risk management. The vulnerability affects a broad range of Android versions, indicating a wide potential impact across devices using these chipsets. Given the critical role of modems in mobile connectivity, exploitation could degrade service quality or cause device reboots, impacting end users and enterprise operations reliant on mobile networks.
Potential Impact
For European organizations, the primary impact is on availability and operational continuity. Devices using affected Unisoc chipsets may experience unexpected crashes or reboots, leading to service interruptions. This is particularly critical for sectors relying on mobile communications such as telecommunications providers, emergency services, logistics, and remote workforce operations. Disruptions could affect mobile network reliability, degrade user experience, and potentially interrupt critical communications. While the vulnerability does not expose data confidentiality or integrity, the denial of service could indirectly impact business processes and customer trust. Enterprises deploying IoT devices or mobile endpoints with these chipsets may face increased downtime or require costly device replacements or firmware updates. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits post-disclosure. The impact is amplified in environments with high dependency on mobile connectivity and limited redundancy.
Mitigation Recommendations
1. Coordinate with device manufacturers and Unisoc to obtain and apply firmware or software patches as soon as they become available. 2. Implement network-level monitoring to detect unusual traffic patterns targeting modem interfaces, which may indicate exploitation attempts. 3. Employ mobile device management (MDM) solutions to enforce timely updates and monitor device health status. 4. For critical infrastructure, consider deploying fallback communication channels or redundant devices to maintain availability during potential disruptions. 5. Educate IT and security teams about this vulnerability to ensure rapid incident response if symptoms of exploitation appear. 6. Restrict exposure of vulnerable devices to untrusted networks where possible, using network segmentation or VPNs. 7. Engage with telecom providers to understand their mitigation strategies and coordinate on threat intelligence sharing. 8. Maintain an inventory of devices using affected chipsets to prioritize patching and monitoring efforts.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Unisoc
- Date Reserved
- 2025-09-28T07:20:05.625Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 692d4907e7f98a81a7fa787d
Added to database: 12/1/2025, 7:51:35 AM
Last enriched: 12/1/2025, 7:54:32 AM
Last updated: 12/3/2025, 12:13:37 PM
Views: 12
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-13947: Vulnerability in Red Hat Red Hat Enterprise Linux 6
HighCVE-2025-13472: CWE-862 Missing Authorization in Perforce BlazeMeter
MediumChrome 143 Patches High-Severity Vulnerabilities
HighCVE-2025-12744: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
HighCVE-2025-29864: CWE-693 Protection Mechanism Failure in ESTsoft ALZip
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.