Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-3012: cwe-125 Out-of-bounds Read in Unisoc (Shanghai) Technologies Co., Ltd. T8100/T9100/T8200/T8300

0
High
VulnerabilityCVE-2025-3012cvecve-2025-3012cwe-125
Published: Mon Dec 01 2025 (12/01/2025, 07:35:55 UTC)
Source: CVE Database V5
Vendor/Project: Unisoc (Shanghai) Technologies Co., Ltd.
Product: T8100/T9100/T8200/T8300

Description

In dpc modem, there is a possible system crash due to null pointer dereference. This could lead to remote denial of service with no additional execution privileges needed

AI-Powered Analysis

AILast updated: 12/08/2025, 08:45:35 UTC

Technical Analysis

CVE-2025-3012 is a vulnerability identified in the dpc modem component of Unisoc (Shanghai) Technologies Co., Ltd. chipsets T8100, T9100, T8200, and T8300. These chipsets are integrated into various Android devices running versions 13 through 16. The vulnerability is classified as an out-of-bounds read (CWE-125), specifically caused by a null pointer dereference within the modem's processing logic. This flaw can be triggered remotely by an attacker without requiring any privileges or user interaction, leading to a system crash and resulting in a denial of service (DoS) condition. The CVSS 3.1 base score of 7.5 indicates a high severity level, with attack vector being network-based (AV:N), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction needed (UI:N). The impact is limited to availability (A:H), with no confidentiality or integrity loss. There are no known exploits in the wild at the time of publication, and no patches have been released yet. The vulnerability was reserved in March 2025 and published in December 2025. The affected chipsets are commonly found in mid-range to budget Android smartphones, which may be widely used in various markets. The vulnerability could be exploited by sending specially crafted network packets to the modem, causing it to dereference a null pointer and crash, disrupting device functionality and potentially impacting mobile communications.

Potential Impact

For European organizations, the primary impact of CVE-2025-3012 is the potential for remote denial of service on devices using affected Unisoc chipsets. This can disrupt mobile communications, affecting employees' ability to use smartphones for calls, messaging, and data services, which are critical for business operations. Sectors such as telecommunications, emergency services, finance, and government agencies relying on mobile connectivity could experience operational interruptions. The vulnerability does not expose sensitive data or allow code execution, so confidentiality and integrity impacts are minimal. However, widespread device crashes could lead to productivity losses, increased support costs, and reputational damage if service outages occur. Additionally, if attackers use this vulnerability as part of a broader campaign, it could amplify disruption across mobile networks. The lack of required authentication or user interaction increases the risk of automated exploitation attempts, especially in environments with exposed mobile network interfaces or weak perimeter defenses.

Mitigation Recommendations

Mitigation of CVE-2025-3012 requires a multi-layered approach. First, organizations should work closely with device manufacturers, mobile carriers, and Unisoc to obtain and deploy firmware or OS updates that address the null pointer dereference once patches become available. Until patches are released, network-level controls should be implemented to monitor and filter suspicious or malformed modem traffic that could trigger the vulnerability. Mobile device management (MDM) solutions can enforce policies to restrict device usage in high-risk environments and monitor for abnormal device crashes. Organizations should also educate users to report unexpected device reboots or connectivity issues promptly. For critical infrastructure, consider deploying redundant communication channels to maintain availability during potential device outages. Regularly reviewing threat intelligence feeds for emerging exploit attempts related to this vulnerability will help in timely detection and response. Finally, collaboration with mobile network operators to enhance detection of anomalous traffic patterns targeting Unisoc modems can provide an additional protective layer.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Unisoc
Date Reserved
2025-03-31T03:18:22.494Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 692d4907e7f98a81a7fa7880

Added to database: 12/1/2025, 7:51:35 AM

Last enriched: 12/8/2025, 8:45:35 AM

Last updated: 1/19/2026, 8:04:59 AM

Views: 41

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats