CVE-2025-61607: cwe-20 Improper Input Validation in Unisoc (Shanghai) Technologies Co., Ltd. T8100/T9100/T8200/T8300
In nr modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service with no additional execution privileges needed
AI Analysis
Technical Summary
CVE-2025-61607 is a vulnerability identified in the NR (New Radio) modem firmware of Unisoc (Shanghai) Technologies Co., Ltd. chipsets T8100, T9100, T8200, and T8300. These chipsets are integrated into various mobile devices running Android versions 13 through 16. The root cause is improper input validation (CWE-20) within the modem's handling of network data, which can be exploited remotely without authentication or user interaction. An attacker can send specially crafted network packets to the modem, triggering a system crash that leads to a denial of service (DoS) condition. The CVSS v3.1 base score is 7.5, indicating high severity, with the vector AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H, meaning the attack can be performed remotely over the network with low complexity, no privileges, and no user interaction, impacting only availability. While no public exploits have been reported, the vulnerability poses a significant risk to device stability and service continuity. The lack of patches at the time of publication necessitates vigilance and interim mitigations. This vulnerability affects the availability of mobile devices and potentially the broader mobile network services relying on these chipsets, which could disrupt communications and critical services dependent on mobile connectivity.
Potential Impact
For European organizations, the primary impact of CVE-2025-61607 is the potential for remote denial of service attacks on mobile devices and infrastructure using Unisoc T8100/T9100/T8200/T8300 chipsets. This could lead to temporary loss of mobile connectivity, affecting business operations reliant on mobile communications, such as remote work, field services, and IoT deployments. Telecommunications providers may experience network instability or increased support costs due to device crashes. Critical sectors like healthcare, emergency services, and transportation that depend on mobile networks could face operational disruptions. The vulnerability does not compromise data confidentiality or integrity but undermines service availability, which can have cascading effects on business continuity and public safety. Given the widespread use of Android devices in Europe, organizations with mobile fleets or BYOD policies should be particularly cautious. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits post-disclosure.
Mitigation Recommendations
1. Monitor Unisoc and device vendors for official patches addressing CVE-2025-61607 and apply them promptly upon release. 2. Until patches are available, implement network-level filtering to detect and block malformed or suspicious NR modem packets that could trigger the vulnerability. 3. Employ mobile device management (MDM) solutions to enforce security policies and quickly deploy updates to affected devices. 4. Conduct regular network traffic analysis to identify anomalous patterns indicative of exploitation attempts targeting the modem. 5. Limit exposure by restricting network access to critical devices, especially in sensitive environments, using VPNs or private APNs. 6. Educate users and IT staff about the symptoms of modem crashes and establish incident response procedures to quickly address service disruptions. 7. Collaborate with telecom providers to understand the deployment of Unisoc chipsets in their infrastructure and coordinate mitigation efforts. 8. Review and update business continuity plans to account for potential mobile service outages caused by this vulnerability.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden
CVE-2025-61607: cwe-20 Improper Input Validation in Unisoc (Shanghai) Technologies Co., Ltd. T8100/T9100/T8200/T8300
Description
In nr modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service with no additional execution privileges needed
AI-Powered Analysis
Technical Analysis
CVE-2025-61607 is a vulnerability identified in the NR (New Radio) modem firmware of Unisoc (Shanghai) Technologies Co., Ltd. chipsets T8100, T9100, T8200, and T8300. These chipsets are integrated into various mobile devices running Android versions 13 through 16. The root cause is improper input validation (CWE-20) within the modem's handling of network data, which can be exploited remotely without authentication or user interaction. An attacker can send specially crafted network packets to the modem, triggering a system crash that leads to a denial of service (DoS) condition. The CVSS v3.1 base score is 7.5, indicating high severity, with the vector AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H, meaning the attack can be performed remotely over the network with low complexity, no privileges, and no user interaction, impacting only availability. While no public exploits have been reported, the vulnerability poses a significant risk to device stability and service continuity. The lack of patches at the time of publication necessitates vigilance and interim mitigations. This vulnerability affects the availability of mobile devices and potentially the broader mobile network services relying on these chipsets, which could disrupt communications and critical services dependent on mobile connectivity.
Potential Impact
For European organizations, the primary impact of CVE-2025-61607 is the potential for remote denial of service attacks on mobile devices and infrastructure using Unisoc T8100/T9100/T8200/T8300 chipsets. This could lead to temporary loss of mobile connectivity, affecting business operations reliant on mobile communications, such as remote work, field services, and IoT deployments. Telecommunications providers may experience network instability or increased support costs due to device crashes. Critical sectors like healthcare, emergency services, and transportation that depend on mobile networks could face operational disruptions. The vulnerability does not compromise data confidentiality or integrity but undermines service availability, which can have cascading effects on business continuity and public safety. Given the widespread use of Android devices in Europe, organizations with mobile fleets or BYOD policies should be particularly cautious. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits post-disclosure.
Mitigation Recommendations
1. Monitor Unisoc and device vendors for official patches addressing CVE-2025-61607 and apply them promptly upon release. 2. Until patches are available, implement network-level filtering to detect and block malformed or suspicious NR modem packets that could trigger the vulnerability. 3. Employ mobile device management (MDM) solutions to enforce security policies and quickly deploy updates to affected devices. 4. Conduct regular network traffic analysis to identify anomalous patterns indicative of exploitation attempts targeting the modem. 5. Limit exposure by restricting network access to critical devices, especially in sensitive environments, using VPNs or private APNs. 6. Educate users and IT staff about the symptoms of modem crashes and establish incident response procedures to quickly address service disruptions. 7. Collaborate with telecom providers to understand the deployment of Unisoc chipsets in their infrastructure and coordinate mitigation efforts. 8. Review and update business continuity plans to account for potential mobile service outages caused by this vulnerability.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Unisoc
- Date Reserved
- 2025-09-28T07:27:04.795Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 692d4907e7f98a81a7fa7883
Added to database: 12/1/2025, 7:51:35 AM
Last enriched: 12/8/2025, 8:45:49 AM
Last updated: 1/17/2026, 7:26:51 PM
Views: 38
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1061: Unrestricted Upload in xiweicheng TMS
MediumCVE-2026-1050: SQL Injection in risesoft-y9 Digital-Infrastructure
MediumCVE-2026-1049: Cross Site Scripting in LigeroSmart
MediumCVE-2026-1048: Cross Site Scripting in LigeroSmart
MediumCVE-2025-15532: Resource Consumption in Open5GS
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.