Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-61607: cwe-20 Improper Input Validation in Unisoc (Shanghai) Technologies Co., Ltd. T8100/T9100/T8200/T8300

0
High
VulnerabilityCVE-2025-61607cvecve-2025-61607cwe-20
Published: Mon Dec 01 2025 (12/01/2025, 07:35:59 UTC)
Source: CVE Database V5
Vendor/Project: Unisoc (Shanghai) Technologies Co., Ltd.
Product: T8100/T9100/T8200/T8300

Description

In nr modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service with no additional execution privileges needed

AI-Powered Analysis

AILast updated: 12/01/2025, 07:53:55 UTC

Technical Analysis

CVE-2025-61607 is a vulnerability identified in the NR (New Radio) modem firmware of Unisoc (Shanghai) Technologies Co., Ltd. chipsets T8100, T9100, T8200, and T8300, which are integrated into devices running Android versions 13 through 16. The root cause is improper input validation (CWE-20) within the modem's processing of network data, which can be exploited remotely by an attacker to induce a system crash, leading to a denial of service (DoS) condition. The attack vector is network-based (AV:N), requiring no privileges (PR:N) or user interaction (UI:N), and has low complexity (AC:L), making exploitation feasible without sophisticated means. The vulnerability does not compromise confidentiality or integrity but severely impacts availability by crashing the modem subsystem, which can disrupt cellular connectivity and device functionality. No patches or mitigations have been released at the time of disclosure, and no active exploitation has been reported. The vulnerability affects a broad range of Android versions, indicating a wide potential attack surface. The NR modem is critical for 5G communications, so disruption can affect voice, data, and emergency services. The lack of authentication requirements means attackers can target devices remotely over the cellular network. This vulnerability highlights the importance of rigorous input validation in modem firmware, given its exposure to untrusted network inputs.

Potential Impact

For European organizations, the primary impact of CVE-2025-61607 is the potential for remote denial of service on devices using affected Unisoc chipsets, which could disrupt mobile communications and operational continuity. Enterprises relying on mobile endpoints for critical communications, remote work, or IoT deployments may experience service outages or degraded connectivity. Telecommunications providers using Unisoc-based infrastructure components could face network instability or customer service interruptions. The disruption of cellular services could also impact emergency response systems and public safety communications in affected regions. Although the vulnerability does not allow data theft or privilege escalation, the loss of availability can have cascading effects on business operations, especially in sectors like finance, healthcare, and transportation that depend on reliable mobile connectivity. The absence of known exploits reduces immediate risk, but the ease of exploitation and broad device coverage necessitate proactive measures. The impact is amplified in countries with high penetration of Unisoc chipset devices and critical dependence on mobile networks for economic and social activities.

Mitigation Recommendations

European organizations should implement a multi-layered mitigation strategy: 1) Maintain an up-to-date inventory of devices and infrastructure components using Unisoc T8100/T9100/T8200/T8300 chipsets to identify vulnerable assets. 2) Monitor vendor communications closely for firmware or software patches addressing this vulnerability and apply them promptly once available. 3) Employ network-level filtering and anomaly detection on cellular traffic to identify and block malformed or suspicious NR modem packets that could trigger the crash. 4) Collaborate with mobile network operators to understand exposure and coordinate defensive measures, including potential network segmentation or traffic rate limiting. 5) For critical endpoints, consider fallback communication methods or redundancy to mitigate the impact of potential service disruptions. 6) Educate IT and security teams about the vulnerability’s characteristics to enhance incident detection and response capabilities. 7) Engage with device manufacturers and vendors to advocate for timely patch development and deployment. These steps go beyond generic advice by focusing on device-specific inventory, network traffic controls tailored to NR modem protocols, and cross-sector coordination.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Unisoc
Date Reserved
2025-09-28T07:27:04.795Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 692d4907e7f98a81a7fa7883

Added to database: 12/1/2025, 7:51:35 AM

Last enriched: 12/1/2025, 7:53:55 AM

Last updated: 12/4/2025, 1:15:35 AM

Views: 14

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats