Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-3012: cwe-125 Out-of-bounds Read in Unisoc (Shanghai) Technologies Co., Ltd. T8100/T9100/T8200/T8300

0
High
VulnerabilityCVE-2025-3012cvecve-2025-3012cwe-125
Published: Mon Dec 01 2025 (12/01/2025, 07:35:55 UTC)
Source: CVE Database V5
Vendor/Project: Unisoc (Shanghai) Technologies Co., Ltd.
Product: T8100/T9100/T8200/T8300

Description

In dpc modem, there is a possible system crash due to null pointer dereference. This could lead to remote denial of service with no additional execution privileges needed

AI-Powered Analysis

AILast updated: 12/01/2025, 07:54:14 UTC

Technical Analysis

CVE-2025-3012 identifies a critical vulnerability in the dpc modem component of Unisoc (Shanghai) Technologies Co., Ltd. chipsets T8100, T9100, T8200, and T8300, which are integrated into Android devices running versions 13 through 16. The vulnerability is classified as an out-of-bounds read (CWE-125) that results in a null pointer dereference. This flaw can be triggered remotely without requiring any authentication or user interaction, allowing an attacker to cause a system crash and thus a denial of service (DoS) condition on affected devices. The CVSS v3.1 score of 7.5 reflects the high impact on availability with no impact on confidentiality or integrity. The vulnerability resides in the modem firmware or software stack responsible for cellular communication, which is critical for device connectivity. Exploitation could disrupt mobile communications, potentially affecting both consumer and enterprise users. No patches or fixes have been released at the time of publication, and no active exploits have been observed in the wild. The vulnerability’s remote nature and lack of required privileges make it a significant threat vector, especially in environments where device uptime and connectivity are essential. The affected chipsets are widely used in budget and mid-range smartphones, which have growing market penetration in Europe. The technical details indicate that the issue was reserved in March 2025 and published in December 2025, suggesting a relatively recent discovery. Organizations should prioritize identifying devices with these chipsets and Android versions to assess exposure.

Potential Impact

For European organizations, the primary impact of CVE-2025-3012 is the potential for remote denial of service on mobile devices using Unisoc T8100, T9100, T8200, and T8300 chipsets running Android 13 to 16. This can disrupt critical communications, especially for sectors relying on mobile connectivity such as emergency services, transportation, and remote workforce operations. Enterprises deploying mobile device management (MDM) solutions may experience operational challenges if large numbers of devices become unresponsive. The lack of privilege escalation limits data breach risks, but availability loss can degrade business continuity and user productivity. Telecommunications providers and mobile network operators may face increased support calls and service degradation if customer devices are affected. The absence of known exploits reduces immediate risk but does not eliminate the threat, as attackers could develop exploits given the public disclosure. The impact is amplified in environments with high reliance on mobile communications and IoT devices using these chipsets. Additionally, the vulnerability could be leveraged in coordinated attacks to cause widespread disruption in critical infrastructure reliant on mobile connectivity.

Mitigation Recommendations

1. Inventory and identify all devices using Unisoc T8100, T9100, T8200, and T8300 chipsets running Android versions 13 through 16 within the organization. 2. Monitor vendor advisories from Unisoc and device manufacturers for patches or firmware updates addressing this vulnerability and apply them promptly once available. 3. Implement network-level protections such as firewall rules and intrusion detection systems to limit exposure of vulnerable devices to untrusted networks, especially restricting access to modem interfaces. 4. Employ anomaly detection and monitoring tools to identify unusual modem crashes or device reboots indicative of exploitation attempts. 5. For critical mobile devices, consider temporary use of alternative hardware or software configurations not affected by this vulnerability until patches are available. 6. Educate IT and security teams about the vulnerability to ensure rapid response to incidents involving device instability. 7. Collaborate with mobile network operators to understand potential network-level mitigations or alerts related to this vulnerability. 8. Avoid exposing vulnerable devices to untrusted or public networks without additional security controls such as VPNs or secure tunnels.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Unisoc
Date Reserved
2025-03-31T03:18:22.494Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 692d4907e7f98a81a7fa7880

Added to database: 12/1/2025, 7:51:35 AM

Last enriched: 12/1/2025, 7:54:14 AM

Last updated: 12/4/2025, 1:09:29 AM

Views: 18

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats