CVE-2025-3012: cwe-125 Out-of-bounds Read in Unisoc (Shanghai) Technologies Co., Ltd. T8100/T9100/T8200/T8300
In dpc modem, there is a possible system crash due to null pointer dereference. This could lead to remote denial of service with no additional execution privileges needed
AI Analysis
Technical Summary
CVE-2025-3012 is a vulnerability identified in the dpc modem component of Unisoc (Shanghai) Technologies Co., Ltd. chipsets T8100, T9100, T8200, and T8300. These chipsets are integrated into various Android devices running versions 13 through 16. The vulnerability is classified as an out-of-bounds read (CWE-125), specifically caused by a null pointer dereference within the modem's processing logic. This flaw can be triggered remotely by an attacker without requiring any privileges or user interaction, leading to a system crash and resulting in a denial of service (DoS) condition. The CVSS 3.1 base score of 7.5 indicates a high severity level, with attack vector being network-based (AV:N), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction needed (UI:N). The impact is limited to availability (A:H), with no confidentiality or integrity loss. There are no known exploits in the wild at the time of publication, and no patches have been released yet. The vulnerability was reserved in March 2025 and published in December 2025. The affected chipsets are commonly found in mid-range to budget Android smartphones, which may be widely used in various markets. The vulnerability could be exploited by sending specially crafted network packets to the modem, causing it to dereference a null pointer and crash, disrupting device functionality and potentially impacting mobile communications.
Potential Impact
For European organizations, the primary impact of CVE-2025-3012 is the potential for remote denial of service on devices using affected Unisoc chipsets. This can disrupt mobile communications, affecting employees' ability to use smartphones for calls, messaging, and data services, which are critical for business operations. Sectors such as telecommunications, emergency services, finance, and government agencies relying on mobile connectivity could experience operational interruptions. The vulnerability does not expose sensitive data or allow code execution, so confidentiality and integrity impacts are minimal. However, widespread device crashes could lead to productivity losses, increased support costs, and reputational damage if service outages occur. Additionally, if attackers use this vulnerability as part of a broader campaign, it could amplify disruption across mobile networks. The lack of required authentication or user interaction increases the risk of automated exploitation attempts, especially in environments with exposed mobile network interfaces or weak perimeter defenses.
Mitigation Recommendations
Mitigation of CVE-2025-3012 requires a multi-layered approach. First, organizations should work closely with device manufacturers, mobile carriers, and Unisoc to obtain and deploy firmware or OS updates that address the null pointer dereference once patches become available. Until patches are released, network-level controls should be implemented to monitor and filter suspicious or malformed modem traffic that could trigger the vulnerability. Mobile device management (MDM) solutions can enforce policies to restrict device usage in high-risk environments and monitor for abnormal device crashes. Organizations should also educate users to report unexpected device reboots or connectivity issues promptly. For critical infrastructure, consider deploying redundant communication channels to maintain availability during potential device outages. Regularly reviewing threat intelligence feeds for emerging exploit attempts related to this vulnerability will help in timely detection and response. Finally, collaboration with mobile network operators to enhance detection of anomalous traffic patterns targeting Unisoc modems can provide an additional protective layer.
Affected Countries
Germany, France, Italy, Spain, United Kingdom, Poland, Netherlands, Belgium, Sweden, Finland
CVE-2025-3012: cwe-125 Out-of-bounds Read in Unisoc (Shanghai) Technologies Co., Ltd. T8100/T9100/T8200/T8300
Description
In dpc modem, there is a possible system crash due to null pointer dereference. This could lead to remote denial of service with no additional execution privileges needed
AI-Powered Analysis
Technical Analysis
CVE-2025-3012 is a vulnerability identified in the dpc modem component of Unisoc (Shanghai) Technologies Co., Ltd. chipsets T8100, T9100, T8200, and T8300. These chipsets are integrated into various Android devices running versions 13 through 16. The vulnerability is classified as an out-of-bounds read (CWE-125), specifically caused by a null pointer dereference within the modem's processing logic. This flaw can be triggered remotely by an attacker without requiring any privileges or user interaction, leading to a system crash and resulting in a denial of service (DoS) condition. The CVSS 3.1 base score of 7.5 indicates a high severity level, with attack vector being network-based (AV:N), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction needed (UI:N). The impact is limited to availability (A:H), with no confidentiality or integrity loss. There are no known exploits in the wild at the time of publication, and no patches have been released yet. The vulnerability was reserved in March 2025 and published in December 2025. The affected chipsets are commonly found in mid-range to budget Android smartphones, which may be widely used in various markets. The vulnerability could be exploited by sending specially crafted network packets to the modem, causing it to dereference a null pointer and crash, disrupting device functionality and potentially impacting mobile communications.
Potential Impact
For European organizations, the primary impact of CVE-2025-3012 is the potential for remote denial of service on devices using affected Unisoc chipsets. This can disrupt mobile communications, affecting employees' ability to use smartphones for calls, messaging, and data services, which are critical for business operations. Sectors such as telecommunications, emergency services, finance, and government agencies relying on mobile connectivity could experience operational interruptions. The vulnerability does not expose sensitive data or allow code execution, so confidentiality and integrity impacts are minimal. However, widespread device crashes could lead to productivity losses, increased support costs, and reputational damage if service outages occur. Additionally, if attackers use this vulnerability as part of a broader campaign, it could amplify disruption across mobile networks. The lack of required authentication or user interaction increases the risk of automated exploitation attempts, especially in environments with exposed mobile network interfaces or weak perimeter defenses.
Mitigation Recommendations
Mitigation of CVE-2025-3012 requires a multi-layered approach. First, organizations should work closely with device manufacturers, mobile carriers, and Unisoc to obtain and deploy firmware or OS updates that address the null pointer dereference once patches become available. Until patches are released, network-level controls should be implemented to monitor and filter suspicious or malformed modem traffic that could trigger the vulnerability. Mobile device management (MDM) solutions can enforce policies to restrict device usage in high-risk environments and monitor for abnormal device crashes. Organizations should also educate users to report unexpected device reboots or connectivity issues promptly. For critical infrastructure, consider deploying redundant communication channels to maintain availability during potential device outages. Regularly reviewing threat intelligence feeds for emerging exploit attempts related to this vulnerability will help in timely detection and response. Finally, collaboration with mobile network operators to enhance detection of anomalous traffic patterns targeting Unisoc modems can provide an additional protective layer.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Unisoc
- Date Reserved
- 2025-03-31T03:18:22.494Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 692d4907e7f98a81a7fa7880
Added to database: 12/1/2025, 7:51:35 AM
Last enriched: 12/8/2025, 8:45:35 AM
Last updated: 1/19/2026, 8:04:59 AM
Views: 41
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1144: Use After Free in quickjs-ng quickjs
MediumCVE-2026-1143: Buffer Overflow in TOTOLINK A3700R
HighCVE-2026-1142: Cross-Site Request Forgery in PHPGurukul News Portal
MediumCVE-2026-1141: Improper Authorization in PHPGurukul News Portal
MediumCVE-2026-1140: Buffer Overflow in UTT 进取 520W
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.