Skip to main content

CVE-2025-31711: cwe-476 NULL Pointer Dereference in Unisoc (Shanghai) Technologies Co., Ltd. SC7731E/SC9832E/SC9863A/T310/T606/T612/T616/T610/T618/T750/T765/T760/T770/T820/S8000/T8300/T9300

Medium
VulnerabilityCVE-2025-31711cvecve-2025-31711cwe-476
Published: Tue Jun 03 2025 (06/03/2025, 05:50:52 UTC)
Source: CVE Database V5
Vendor/Project: Unisoc (Shanghai) Technologies Co., Ltd.
Product: SC7731E/SC9832E/SC9863A/T310/T606/T612/T616/T610/T618/T750/T765/T760/T770/T820/S8000/T8300/T9300

Description

In cplog service, there is a possible system crash due to null pointer dereference. This could lead to local denial of service with no additional execution privileges needed.

AI-Powered Analysis

AILast updated: 07/11/2025, 06:46:56 UTC

Technical Analysis

CVE-2025-31711 is a medium-severity vulnerability identified in the cplog service of several Unisoc (Shanghai) Technologies Co., Ltd. chipsets, including SC7731E, SC9832E, SC9863A, and multiple T-series models such as T310, T606, T612, T616, T610, T618, T750, T765, T760, T770, T820, S8000, T8300, and T9300. These chipsets are integrated into devices running Android versions 13, 14, and 15. The vulnerability is classified under CWE-476, which corresponds to a NULL Pointer Dereference. Specifically, the flaw occurs in the cplog service where a null pointer dereference can cause the system to crash. This results in a local denial of service (DoS) condition without requiring any additional execution privileges or user interaction. The CVSS v3.1 base score is 5.1, reflecting a medium severity level. The attack vector is local (AV:L), with low attack complexity (AC:L), no privileges required (PR:N), and no user interaction needed (UI:N). The impact affects integrity and availability but not confidentiality. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability could be triggered by a local attacker or malicious application on the device, causing the system or service to crash, potentially disrupting device functionality or stability. Given the affected chipsets are widely used in low to mid-range Android devices, the vulnerability could impact a broad range of consumer electronics, including smartphones and IoT devices using these Unisoc chipsets.

Potential Impact

For European organizations, the primary impact of CVE-2025-31711 is the potential for local denial of service on devices incorporating the affected Unisoc chipsets running Android 13 to 15. This could disrupt business operations relying on mobile devices or embedded systems using these chipsets, especially in sectors where device availability is critical, such as logistics, retail, or field services. Although the vulnerability does not allow privilege escalation or data leakage, repeated or targeted exploitation could degrade device reliability, causing operational interruptions or increased maintenance costs. In environments with Bring Your Own Device (BYOD) policies, compromised employee devices could affect productivity. Additionally, IoT deployments using these chipsets might experience service interruptions, impacting automation or monitoring systems. The lack of remote exploitability limits the threat to local or physically proximate attackers, reducing the risk of widespread remote attacks but still posing a concern for insider threats or malware with local execution capabilities.

Mitigation Recommendations

To mitigate CVE-2025-31711, European organizations should: 1) Monitor vendor communications and Unisoc advisories for official patches or firmware updates addressing this vulnerability, and prioritize timely deployment once available. 2) Implement strict application control policies on Android devices to prevent installation or execution of untrusted or potentially malicious local applications that could trigger the null pointer dereference. 3) Employ mobile device management (MDM) solutions to enforce security configurations, restrict local access, and monitor device health for abnormal crashes indicative of exploitation attempts. 4) Educate users on the risks of installing unverified apps and encourage reporting of device instability. 5) For IoT devices using affected chipsets, isolate them on segmented networks to limit local attack vectors and monitor for unusual device behavior. 6) Where possible, consider hardware replacement or alternative chipsets for critical systems if patching is delayed or unavailable. These steps go beyond generic advice by focusing on controlling local attack surfaces, enhancing monitoring for device stability, and preparing for patch deployment.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Unisoc
Date Reserved
2025-04-01T08:30:14.186Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 683ee1eb182aa0cae2739632

Added to database: 6/3/2025, 11:52:11 AM

Last enriched: 7/11/2025, 6:46:56 AM

Last updated: 8/17/2025, 12:53:15 PM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats