Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-31719: cwe-665 Improper Initialization in Unisoc (Shanghai) Technologies Co., Ltd. SC7731E/SC9832E/SC9863A/T310/T606/T612/T616/T610/T618/T750/T765/T760/T770/T820/S8000/T8300/T9300

0
Medium
VulnerabilityCVE-2025-31719cvecve-2025-31719cwe-665
Published: Tue Nov 11 2025 (11/11/2025, 00:33:24 UTC)
Source: CVE Database V5
Vendor/Project: Unisoc (Shanghai) Technologies Co., Ltd.
Product: SC7731E/SC9832E/SC9863A/T310/T606/T612/T616/T610/T618/T750/T765/T760/T770/T820/S8000/T8300/T9300

Description

In TEE EcDSA algorithm, there is a possible memory consistency issue. This could lead to generated incorrect signature results with low probability.

AI-Powered Analysis

AILast updated: 11/18/2025, 04:17:41 UTC

Technical Analysis

CVE-2025-31719 identifies a vulnerability in the Trusted Execution Environment (TEE) implementation of the Elliptic Curve Digital Signature Algorithm (EcDSA) on Unisoc (Shanghai) Technologies Co., Ltd. chipsets, including models SC7731E, SC9832E, SC9863A, and multiple T-series variants. The issue stems from improper initialization leading to a memory consistency problem within the TEE's cryptographic operations. This flaw can cause the generation of incorrect digital signatures, albeit with a low probability. Since EcDSA signatures are critical for ensuring data integrity and authentication, incorrect signatures can undermine trust in cryptographic processes. The vulnerability affects devices running Android versions 13 through 16 that incorporate these Unisoc chipsets. The CVSS v3.1 score is 5.1 (medium), reflecting that the attack vector is local (AV:L), with low complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N). The impact is limited to integrity and availability, with no confidentiality loss. No patches are currently linked, and no exploits have been reported in the wild. The CWE classification is CWE-665, indicating improper initialization as the root cause. This vulnerability highlights risks in secure hardware-based cryptographic implementations, especially in resource-constrained or budget mobile devices where Unisoc chipsets are prevalent.

Potential Impact

For European organizations, the primary impact lies in the potential compromise of cryptographic integrity on devices using affected Unisoc chipsets. This could affect secure communications, authentication mechanisms, and digital signature validation processes relying on the TEE EcDSA implementation. Although the probability of incorrect signature generation is low, such errors could lead to denial of service in security-critical applications or undermine trust in device-generated signatures. The vulnerability does not expose confidential data directly but may disrupt availability and integrity of cryptographic functions. Organizations relying on mobile devices with these chipsets for secure access or sensitive operations may face increased risk of operational disruptions or security policy violations. The local attack vector and lack of required privileges reduce the likelihood of widespread remote exploitation but insider threats or compromised devices could exploit this flaw. The absence of known exploits currently limits immediate risk but proactive mitigation is advised.

Mitigation Recommendations

Organizations should monitor Unisoc and device vendor advisories for patches addressing this vulnerability and apply updates promptly once available. In the interim, restrict physical and local access to devices with affected chipsets to trusted personnel only. Employ device management solutions to inventory and identify devices running vulnerable Unisoc chipsets and Android versions 13 to 16. Where feasible, consider replacing or isolating devices that cannot be patched. Implement additional layers of cryptographic verification outside the TEE when possible, such as server-side signature validation or multi-factor authentication, to mitigate risks from incorrect signatures. Educate users and administrators about the potential risks of local exploitation and enforce strict access controls. Regularly audit cryptographic operations and logs for anomalies that may indicate signature failures or tampering attempts. Collaborate with mobile device manufacturers and Unisoc for timely security updates and guidance.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Unisoc
Date Reserved
2025-04-01T08:30:14.187Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6912870714bc3e00ba6f3bbf

Added to database: 11/11/2025, 12:44:55 AM

Last enriched: 11/18/2025, 4:17:41 AM

Last updated: 11/20/2025, 4:15:58 AM

Views: 20

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats