CVE-2025-31712: cwe-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') in Unisoc (Shanghai) Technologies Co., Ltd. SC7731E/SC9832E/SC9863A/T310/T606/T612/T616/T610/T618/T750/T765/T760/T770/T820/S8000/T8300/T9300
In cplog service, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service with no additional execution privileges needed.
AI Analysis
Technical Summary
CVE-2025-31712 is a medium-severity buffer overflow vulnerability identified in the cplog service of several Unisoc (Shanghai) Technologies Co., Ltd. chipsets, including SC7731E, SC9832E, SC9863A, and multiple others widely used in mobile devices. The vulnerability arises from a classic buffer copy without checking the size of the input (CWE-120), leading to a possible out-of-bounds write. This flaw exists due to missing bounds checking in the cplog service, which is part of the firmware or low-level software stack running on these chipsets. Exploitation of this vulnerability can cause a local denial of service (DoS) condition by crashing or destabilizing the affected device. Notably, the vulnerability does not require any additional execution privileges or user interaction, but it is limited to local access, meaning an attacker must have local access to the device to trigger the flaw. The affected devices run Android versions 13, 14, and 15, indicating that the vulnerability impacts relatively recent Android-based devices using these Unisoc chipsets. The CVSS v3.1 base score is 5.1, reflecting a medium severity level primarily due to the local attack vector and lack of confidentiality impact. There are currently no known exploits in the wild, and no patches have been linked yet. The vulnerability could be leveraged by attackers with local access to cause device instability or denial of service, potentially disrupting device availability and user experience.
Potential Impact
For European organizations, the primary impact of CVE-2025-31712 lies in potential device instability and denial of service on devices using affected Unisoc chipsets running Android 13-15. This could affect mobile devices used by employees, particularly in sectors relying on mobile communications and field operations. While the vulnerability does not allow privilege escalation or data exfiltration, denial of service could disrupt business continuity, especially in critical communication scenarios. Organizations deploying mobile devices with these chipsets may face increased support costs and operational disruptions if devices become unstable or unusable. Additionally, if attackers gain local access to devices (e.g., through physical access or via compromised apps exploiting local interfaces), they could trigger the DoS condition, impacting availability. The lack of remote exploitability limits the threat surface but does not eliminate risk in environments where devices are physically accessible or used in less controlled settings. Overall, the impact is moderate but should not be ignored, especially for organizations with large deployments of affected devices or those in sensitive operational contexts.
Mitigation Recommendations
To mitigate CVE-2025-31712, organizations should: 1) Inventory and identify devices using the affected Unisoc chipsets and running Android 13-15 to assess exposure. 2) Monitor vendor and security advisories for patches or firmware updates from Unisoc or device manufacturers and apply them promptly once available. 3) Limit local access to devices by enforcing strict physical security controls and device usage policies to reduce the risk of local exploitation. 4) Employ mobile device management (MDM) solutions to monitor device health and detect abnormal crashes or instability that could indicate exploitation attempts. 5) Educate users on the importance of not installing untrusted applications or granting unnecessary permissions that could facilitate local access to the vulnerable service. 6) For high-security environments, consider restricting or isolating devices with these chipsets until patches are applied. 7) Engage with device vendors to request timely updates and confirm patch availability. These steps go beyond generic advice by focusing on device inventory, physical security, monitoring, and vendor engagement specific to this vulnerability and chipset family.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Poland, Netherlands
CVE-2025-31712: cwe-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') in Unisoc (Shanghai) Technologies Co., Ltd. SC7731E/SC9832E/SC9863A/T310/T606/T612/T616/T610/T618/T750/T765/T760/T770/T820/S8000/T8300/T9300
Description
In cplog service, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service with no additional execution privileges needed.
AI-Powered Analysis
Technical Analysis
CVE-2025-31712 is a medium-severity buffer overflow vulnerability identified in the cplog service of several Unisoc (Shanghai) Technologies Co., Ltd. chipsets, including SC7731E, SC9832E, SC9863A, and multiple others widely used in mobile devices. The vulnerability arises from a classic buffer copy without checking the size of the input (CWE-120), leading to a possible out-of-bounds write. This flaw exists due to missing bounds checking in the cplog service, which is part of the firmware or low-level software stack running on these chipsets. Exploitation of this vulnerability can cause a local denial of service (DoS) condition by crashing or destabilizing the affected device. Notably, the vulnerability does not require any additional execution privileges or user interaction, but it is limited to local access, meaning an attacker must have local access to the device to trigger the flaw. The affected devices run Android versions 13, 14, and 15, indicating that the vulnerability impacts relatively recent Android-based devices using these Unisoc chipsets. The CVSS v3.1 base score is 5.1, reflecting a medium severity level primarily due to the local attack vector and lack of confidentiality impact. There are currently no known exploits in the wild, and no patches have been linked yet. The vulnerability could be leveraged by attackers with local access to cause device instability or denial of service, potentially disrupting device availability and user experience.
Potential Impact
For European organizations, the primary impact of CVE-2025-31712 lies in potential device instability and denial of service on devices using affected Unisoc chipsets running Android 13-15. This could affect mobile devices used by employees, particularly in sectors relying on mobile communications and field operations. While the vulnerability does not allow privilege escalation or data exfiltration, denial of service could disrupt business continuity, especially in critical communication scenarios. Organizations deploying mobile devices with these chipsets may face increased support costs and operational disruptions if devices become unstable or unusable. Additionally, if attackers gain local access to devices (e.g., through physical access or via compromised apps exploiting local interfaces), they could trigger the DoS condition, impacting availability. The lack of remote exploitability limits the threat surface but does not eliminate risk in environments where devices are physically accessible or used in less controlled settings. Overall, the impact is moderate but should not be ignored, especially for organizations with large deployments of affected devices or those in sensitive operational contexts.
Mitigation Recommendations
To mitigate CVE-2025-31712, organizations should: 1) Inventory and identify devices using the affected Unisoc chipsets and running Android 13-15 to assess exposure. 2) Monitor vendor and security advisories for patches or firmware updates from Unisoc or device manufacturers and apply them promptly once available. 3) Limit local access to devices by enforcing strict physical security controls and device usage policies to reduce the risk of local exploitation. 4) Employ mobile device management (MDM) solutions to monitor device health and detect abnormal crashes or instability that could indicate exploitation attempts. 5) Educate users on the importance of not installing untrusted applications or granting unnecessary permissions that could facilitate local access to the vulnerable service. 6) For high-security environments, consider restricting or isolating devices with these chipsets until patches are applied. 7) Engage with device vendors to request timely updates and confirm patch availability. These steps go beyond generic advice by focusing on device inventory, physical security, monitoring, and vendor engagement specific to this vulnerability and chipset family.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Unisoc
- Date Reserved
- 2025-04-01T08:30:14.186Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 683ee1eb182aa0cae2739636
Added to database: 6/3/2025, 11:52:11 AM
Last enriched: 7/11/2025, 6:47:28 AM
Last updated: 8/13/2025, 12:37:16 PM
Views: 17
Related Threats
CVE-2025-36088: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in IBM Storage TS4500 Library
MediumCVE-2025-43490: CWE-59 Improper Link Resolution Before File Access ('Link Following') in HP, Inc. HP Hotkey Support Software
MediumCVE-2025-9060: CWE-20 Improper Input Validation in MSoft MFlash
CriticalCVE-2025-8675: CWE-918 Server-Side Request Forgery (SSRF) in Drupal AI SEO Link Advisor
MediumCVE-2025-8362: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Drupal GoogleTag Manager
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.