CVE-2025-3012: cwe-125 Out-of-bounds Read in Unisoc (Shanghai) Technologies Co., Ltd. T8100/T9100/T8200/T8300
In dpc modem, there is a possible system crash due to null pointer dereference. This could lead to remote denial of service with no additional execution privileges needed
AI Analysis
Technical Summary
CVE-2025-3012 identifies a critical vulnerability in the dpc modem component of Unisoc (Shanghai) Technologies Co., Ltd. chipsets T8100, T9100, T8200, and T8300, which are integrated into Android devices running versions 13 through 16. The vulnerability is classified as an out-of-bounds read (CWE-125) that results in a null pointer dereference. This flaw can be triggered remotely without requiring any authentication or user interaction, allowing an attacker to cause a system crash and thus a denial of service (DoS) condition on affected devices. The CVSS v3.1 score of 7.5 reflects the high impact on availability with no impact on confidentiality or integrity. The vulnerability resides in the modem firmware or software stack responsible for cellular communication, which is critical for device connectivity. Exploitation could disrupt mobile communications, potentially affecting both consumer and enterprise users. No patches or fixes have been released at the time of publication, and no active exploits have been observed in the wild. The vulnerability’s remote nature and lack of required privileges make it a significant threat vector, especially in environments where device uptime and connectivity are essential. The affected chipsets are widely used in budget and mid-range smartphones, which have growing market penetration in Europe. The technical details indicate that the issue was reserved in March 2025 and published in December 2025, suggesting a relatively recent discovery. Organizations should prioritize identifying devices with these chipsets and Android versions to assess exposure.
Potential Impact
For European organizations, the primary impact of CVE-2025-3012 is the potential for remote denial of service on mobile devices using Unisoc T8100, T9100, T8200, and T8300 chipsets running Android 13 to 16. This can disrupt critical communications, especially for sectors relying on mobile connectivity such as emergency services, transportation, and remote workforce operations. Enterprises deploying mobile device management (MDM) solutions may experience operational challenges if large numbers of devices become unresponsive. The lack of privilege escalation limits data breach risks, but availability loss can degrade business continuity and user productivity. Telecommunications providers and mobile network operators may face increased support calls and service degradation if customer devices are affected. The absence of known exploits reduces immediate risk but does not eliminate the threat, as attackers could develop exploits given the public disclosure. The impact is amplified in environments with high reliance on mobile communications and IoT devices using these chipsets. Additionally, the vulnerability could be leveraged in coordinated attacks to cause widespread disruption in critical infrastructure reliant on mobile connectivity.
Mitigation Recommendations
1. Inventory and identify all devices using Unisoc T8100, T9100, T8200, and T8300 chipsets running Android versions 13 through 16 within the organization. 2. Monitor vendor advisories from Unisoc and device manufacturers for patches or firmware updates addressing this vulnerability and apply them promptly once available. 3. Implement network-level protections such as firewall rules and intrusion detection systems to limit exposure of vulnerable devices to untrusted networks, especially restricting access to modem interfaces. 4. Employ anomaly detection and monitoring tools to identify unusual modem crashes or device reboots indicative of exploitation attempts. 5. For critical mobile devices, consider temporary use of alternative hardware or software configurations not affected by this vulnerability until patches are available. 6. Educate IT and security teams about the vulnerability to ensure rapid response to incidents involving device instability. 7. Collaborate with mobile network operators to understand potential network-level mitigations or alerts related to this vulnerability. 8. Avoid exposing vulnerable devices to untrusted or public networks without additional security controls such as VPNs or secure tunnels.
Affected Countries
Germany, France, Italy, Spain, United Kingdom, Netherlands, Poland, Sweden
CVE-2025-3012: cwe-125 Out-of-bounds Read in Unisoc (Shanghai) Technologies Co., Ltd. T8100/T9100/T8200/T8300
Description
In dpc modem, there is a possible system crash due to null pointer dereference. This could lead to remote denial of service with no additional execution privileges needed
AI-Powered Analysis
Technical Analysis
CVE-2025-3012 identifies a critical vulnerability in the dpc modem component of Unisoc (Shanghai) Technologies Co., Ltd. chipsets T8100, T9100, T8200, and T8300, which are integrated into Android devices running versions 13 through 16. The vulnerability is classified as an out-of-bounds read (CWE-125) that results in a null pointer dereference. This flaw can be triggered remotely without requiring any authentication or user interaction, allowing an attacker to cause a system crash and thus a denial of service (DoS) condition on affected devices. The CVSS v3.1 score of 7.5 reflects the high impact on availability with no impact on confidentiality or integrity. The vulnerability resides in the modem firmware or software stack responsible for cellular communication, which is critical for device connectivity. Exploitation could disrupt mobile communications, potentially affecting both consumer and enterprise users. No patches or fixes have been released at the time of publication, and no active exploits have been observed in the wild. The vulnerability’s remote nature and lack of required privileges make it a significant threat vector, especially in environments where device uptime and connectivity are essential. The affected chipsets are widely used in budget and mid-range smartphones, which have growing market penetration in Europe. The technical details indicate that the issue was reserved in March 2025 and published in December 2025, suggesting a relatively recent discovery. Organizations should prioritize identifying devices with these chipsets and Android versions to assess exposure.
Potential Impact
For European organizations, the primary impact of CVE-2025-3012 is the potential for remote denial of service on mobile devices using Unisoc T8100, T9100, T8200, and T8300 chipsets running Android 13 to 16. This can disrupt critical communications, especially for sectors relying on mobile connectivity such as emergency services, transportation, and remote workforce operations. Enterprises deploying mobile device management (MDM) solutions may experience operational challenges if large numbers of devices become unresponsive. The lack of privilege escalation limits data breach risks, but availability loss can degrade business continuity and user productivity. Telecommunications providers and mobile network operators may face increased support calls and service degradation if customer devices are affected. The absence of known exploits reduces immediate risk but does not eliminate the threat, as attackers could develop exploits given the public disclosure. The impact is amplified in environments with high reliance on mobile communications and IoT devices using these chipsets. Additionally, the vulnerability could be leveraged in coordinated attacks to cause widespread disruption in critical infrastructure reliant on mobile connectivity.
Mitigation Recommendations
1. Inventory and identify all devices using Unisoc T8100, T9100, T8200, and T8300 chipsets running Android versions 13 through 16 within the organization. 2. Monitor vendor advisories from Unisoc and device manufacturers for patches or firmware updates addressing this vulnerability and apply them promptly once available. 3. Implement network-level protections such as firewall rules and intrusion detection systems to limit exposure of vulnerable devices to untrusted networks, especially restricting access to modem interfaces. 4. Employ anomaly detection and monitoring tools to identify unusual modem crashes or device reboots indicative of exploitation attempts. 5. For critical mobile devices, consider temporary use of alternative hardware or software configurations not affected by this vulnerability until patches are available. 6. Educate IT and security teams about the vulnerability to ensure rapid response to incidents involving device instability. 7. Collaborate with mobile network operators to understand potential network-level mitigations or alerts related to this vulnerability. 8. Avoid exposing vulnerable devices to untrusted or public networks without additional security controls such as VPNs or secure tunnels.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Unisoc
- Date Reserved
- 2025-03-31T03:18:22.494Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 692d4907e7f98a81a7fa7880
Added to database: 12/1/2025, 7:51:35 AM
Last enriched: 12/1/2025, 7:54:14 AM
Last updated: 12/4/2025, 1:09:29 AM
Views: 18
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-62173: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in FreePBX security-reporting
HighCVE-2025-64055: n/a
UnknownCVE-2025-66404: CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') in Flux159 mcp-server-kubernetes
MediumCVE-2025-66293: CWE-125: Out-of-bounds Read in pnggroup libpng
HighCVE-2025-65868: n/a
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.