CVE-2025-31719: cwe-665 Improper Initialization in Unisoc (Shanghai) Technologies Co., Ltd. SC7731E/SC9832E/SC9863A/T310/T606/T612/T616/T610/T618/T750/T765/T760/T770/T820/S8000/T8300/T9300
In TEE EcDSA algorithm, there is a possible memory consistency issue. This could lead to generated incorrect signature results with low probability.
AI Analysis
Technical Summary
CVE-2025-31719 identifies a vulnerability in the Trusted Execution Environment (TEE) implementation of the Elliptic Curve Digital Signature Algorithm (EcDSA) on Unisoc (Shanghai) Technologies Co., Ltd. chipsets, including models SC7731E, SC9832E, SC9863A, and multiple T-series variants. The issue stems from improper initialization leading to a memory consistency problem within the TEE's cryptographic operations. This flaw can cause the generation of incorrect digital signatures, albeit with a low probability. Since EcDSA signatures are critical for ensuring data integrity and authentication, incorrect signatures can undermine trust in cryptographic processes. The vulnerability affects devices running Android versions 13 through 16 that incorporate these Unisoc chipsets. The CVSS v3.1 score is 5.1 (medium), reflecting that the attack vector is local (AV:L), with low complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N). The impact is limited to integrity and availability, with no confidentiality loss. No patches are currently linked, and no exploits have been reported in the wild. The CWE classification is CWE-665, indicating improper initialization as the root cause. This vulnerability highlights risks in secure hardware-based cryptographic implementations, especially in resource-constrained or budget mobile devices where Unisoc chipsets are prevalent.
Potential Impact
For European organizations, the primary impact lies in the potential compromise of cryptographic integrity on devices using affected Unisoc chipsets. This could affect secure communications, authentication mechanisms, and digital signature validation processes relying on the TEE EcDSA implementation. Although the probability of incorrect signature generation is low, such errors could lead to denial of service in security-critical applications or undermine trust in device-generated signatures. The vulnerability does not expose confidential data directly but may disrupt availability and integrity of cryptographic functions. Organizations relying on mobile devices with these chipsets for secure access or sensitive operations may face increased risk of operational disruptions or security policy violations. The local attack vector and lack of required privileges reduce the likelihood of widespread remote exploitation but insider threats or compromised devices could exploit this flaw. The absence of known exploits currently limits immediate risk but proactive mitigation is advised.
Mitigation Recommendations
Organizations should monitor Unisoc and device vendor advisories for patches addressing this vulnerability and apply updates promptly once available. In the interim, restrict physical and local access to devices with affected chipsets to trusted personnel only. Employ device management solutions to inventory and identify devices running vulnerable Unisoc chipsets and Android versions 13 to 16. Where feasible, consider replacing or isolating devices that cannot be patched. Implement additional layers of cryptographic verification outside the TEE when possible, such as server-side signature validation or multi-factor authentication, to mitigate risks from incorrect signatures. Educate users and administrators about the potential risks of local exploitation and enforce strict access controls. Regularly audit cryptographic operations and logs for anomalies that may indicate signature failures or tampering attempts. Collaborate with mobile device manufacturers and Unisoc for timely security updates and guidance.
Affected Countries
Germany, France, Italy, Spain, United Kingdom, Poland, Netherlands
CVE-2025-31719: cwe-665 Improper Initialization in Unisoc (Shanghai) Technologies Co., Ltd. SC7731E/SC9832E/SC9863A/T310/T606/T612/T616/T610/T618/T750/T765/T760/T770/T820/S8000/T8300/T9300
Description
In TEE EcDSA algorithm, there is a possible memory consistency issue. This could lead to generated incorrect signature results with low probability.
AI-Powered Analysis
Technical Analysis
CVE-2025-31719 identifies a vulnerability in the Trusted Execution Environment (TEE) implementation of the Elliptic Curve Digital Signature Algorithm (EcDSA) on Unisoc (Shanghai) Technologies Co., Ltd. chipsets, including models SC7731E, SC9832E, SC9863A, and multiple T-series variants. The issue stems from improper initialization leading to a memory consistency problem within the TEE's cryptographic operations. This flaw can cause the generation of incorrect digital signatures, albeit with a low probability. Since EcDSA signatures are critical for ensuring data integrity and authentication, incorrect signatures can undermine trust in cryptographic processes. The vulnerability affects devices running Android versions 13 through 16 that incorporate these Unisoc chipsets. The CVSS v3.1 score is 5.1 (medium), reflecting that the attack vector is local (AV:L), with low complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N). The impact is limited to integrity and availability, with no confidentiality loss. No patches are currently linked, and no exploits have been reported in the wild. The CWE classification is CWE-665, indicating improper initialization as the root cause. This vulnerability highlights risks in secure hardware-based cryptographic implementations, especially in resource-constrained or budget mobile devices where Unisoc chipsets are prevalent.
Potential Impact
For European organizations, the primary impact lies in the potential compromise of cryptographic integrity on devices using affected Unisoc chipsets. This could affect secure communications, authentication mechanisms, and digital signature validation processes relying on the TEE EcDSA implementation. Although the probability of incorrect signature generation is low, such errors could lead to denial of service in security-critical applications or undermine trust in device-generated signatures. The vulnerability does not expose confidential data directly but may disrupt availability and integrity of cryptographic functions. Organizations relying on mobile devices with these chipsets for secure access or sensitive operations may face increased risk of operational disruptions or security policy violations. The local attack vector and lack of required privileges reduce the likelihood of widespread remote exploitation but insider threats or compromised devices could exploit this flaw. The absence of known exploits currently limits immediate risk but proactive mitigation is advised.
Mitigation Recommendations
Organizations should monitor Unisoc and device vendor advisories for patches addressing this vulnerability and apply updates promptly once available. In the interim, restrict physical and local access to devices with affected chipsets to trusted personnel only. Employ device management solutions to inventory and identify devices running vulnerable Unisoc chipsets and Android versions 13 to 16. Where feasible, consider replacing or isolating devices that cannot be patched. Implement additional layers of cryptographic verification outside the TEE when possible, such as server-side signature validation or multi-factor authentication, to mitigate risks from incorrect signatures. Educate users and administrators about the potential risks of local exploitation and enforce strict access controls. Regularly audit cryptographic operations and logs for anomalies that may indicate signature failures or tampering attempts. Collaborate with mobile device manufacturers and Unisoc for timely security updates and guidance.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Unisoc
- Date Reserved
- 2025-04-01T08:30:14.187Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6912870714bc3e00ba6f3bbf
Added to database: 11/11/2025, 12:44:55 AM
Last enriched: 11/18/2025, 4:17:41 AM
Last updated: 11/20/2025, 4:15:58 AM
Views: 20
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
RCE via a malicious SVG in mPDF
MediumCVE-2025-13451: SQL Injection in SourceCodester Online Shop Project
MediumCVE-2025-13450: Cross Site Scripting in SourceCodester Online Shop Project
MediumCVE-2025-13449: SQL Injection in code-projects Online Shop Project
MediumCVE-2025-13446: Stack-based Buffer Overflow in Tenda AC21
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.