CVE-2025-61608: cwe-20 Improper Input Validation in Unisoc (Shanghai) Technologies Co., Ltd. T8100/T9100/T8200/T8300
In nr modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service with no additional execution privileges needed
AI Analysis
Technical Summary
CVE-2025-61608 identifies a vulnerability in the NR (New Radio) modem component of Unisoc (Shanghai) Technologies Co., Ltd. chipsets T8100, T9100, T8200, and T8300, which are integrated into Android devices running versions 13 through 16. The root cause is improper input validation (CWE-20), where the modem fails to correctly validate certain inputs, allowing specially crafted remote inputs to trigger a system crash. This leads to a denial of service condition without requiring any privileges or user interaction, making it remotely exploitable over the network. The vulnerability impacts the availability of the device by causing it to become unresponsive or reboot, disrupting normal operations. The CVSS v3.1 score of 7.5 reflects a high severity due to network attack vector, low attack complexity, no privileges required, and no user interaction needed, with impact focused solely on availability. No known exploits have been reported in the wild, and no official patches have been released as of the publication date. The vulnerability affects a broad range of Android versions, indicating a potentially wide attack surface. Given the critical role of modems in mobile communications, exploitation could disrupt voice, data, and emergency services on affected devices.
Potential Impact
For European organizations, the primary impact is the potential disruption of mobile device availability, which can affect business continuity, especially in sectors relying heavily on mobile communications such as finance, healthcare, emergency services, and critical infrastructure. The denial of service could interrupt communications, delay operations, and degrade user trust. While confidentiality and integrity are not directly impacted, the loss of availability can have cascading effects on operational processes and incident response capabilities. Organizations with employees or assets using devices powered by Unisoc T8100/T9100/T8200/T8300 chipsets running Android 13-16 are at risk. Telecommunications providers and enterprises deploying mobile endpoints in Europe must consider the risk of targeted remote DoS attacks, which could be leveraged by threat actors to cause service outages or distractions during broader attack campaigns. The lack of current exploits provides a window for proactive mitigation, but the absence of patches increases urgency for interim protective measures.
Mitigation Recommendations
1. Implement network-level filtering and anomaly detection to identify and block malformed or suspicious NR modem inputs that could trigger the vulnerability. 2. Coordinate with device manufacturers and Unisoc for timely updates and patches; prioritize patch deployment as soon as they become available. 3. Monitor device logs and network traffic for signs of repeated modem crashes or unusual connectivity disruptions indicative of exploitation attempts. 4. Employ mobile device management (MDM) solutions to enforce security policies and facilitate rapid response to affected devices. 5. Educate users and IT staff about the symptoms of modem-related DoS and establish incident response protocols to isolate and remediate affected devices quickly. 6. Where feasible, restrict exposure of vulnerable devices to untrusted networks or implement VPNs and secure tunnels to reduce attack surface. 7. Engage with telecom providers to understand the prevalence of Unisoc chipsets in their networks and collaborate on threat intelligence sharing.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Poland, Netherlands, Sweden, Belgium, Finland
CVE-2025-61608: cwe-20 Improper Input Validation in Unisoc (Shanghai) Technologies Co., Ltd. T8100/T9100/T8200/T8300
Description
In nr modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service with no additional execution privileges needed
AI-Powered Analysis
Technical Analysis
CVE-2025-61608 identifies a vulnerability in the NR (New Radio) modem component of Unisoc (Shanghai) Technologies Co., Ltd. chipsets T8100, T9100, T8200, and T8300, which are integrated into Android devices running versions 13 through 16. The root cause is improper input validation (CWE-20), where the modem fails to correctly validate certain inputs, allowing specially crafted remote inputs to trigger a system crash. This leads to a denial of service condition without requiring any privileges or user interaction, making it remotely exploitable over the network. The vulnerability impacts the availability of the device by causing it to become unresponsive or reboot, disrupting normal operations. The CVSS v3.1 score of 7.5 reflects a high severity due to network attack vector, low attack complexity, no privileges required, and no user interaction needed, with impact focused solely on availability. No known exploits have been reported in the wild, and no official patches have been released as of the publication date. The vulnerability affects a broad range of Android versions, indicating a potentially wide attack surface. Given the critical role of modems in mobile communications, exploitation could disrupt voice, data, and emergency services on affected devices.
Potential Impact
For European organizations, the primary impact is the potential disruption of mobile device availability, which can affect business continuity, especially in sectors relying heavily on mobile communications such as finance, healthcare, emergency services, and critical infrastructure. The denial of service could interrupt communications, delay operations, and degrade user trust. While confidentiality and integrity are not directly impacted, the loss of availability can have cascading effects on operational processes and incident response capabilities. Organizations with employees or assets using devices powered by Unisoc T8100/T9100/T8200/T8300 chipsets running Android 13-16 are at risk. Telecommunications providers and enterprises deploying mobile endpoints in Europe must consider the risk of targeted remote DoS attacks, which could be leveraged by threat actors to cause service outages or distractions during broader attack campaigns. The lack of current exploits provides a window for proactive mitigation, but the absence of patches increases urgency for interim protective measures.
Mitigation Recommendations
1. Implement network-level filtering and anomaly detection to identify and block malformed or suspicious NR modem inputs that could trigger the vulnerability. 2. Coordinate with device manufacturers and Unisoc for timely updates and patches; prioritize patch deployment as soon as they become available. 3. Monitor device logs and network traffic for signs of repeated modem crashes or unusual connectivity disruptions indicative of exploitation attempts. 4. Employ mobile device management (MDM) solutions to enforce security policies and facilitate rapid response to affected devices. 5. Educate users and IT staff about the symptoms of modem-related DoS and establish incident response protocols to isolate and remediate affected devices quickly. 6. Where feasible, restrict exposure of vulnerable devices to untrusted networks or implement VPNs and secure tunnels to reduce attack surface. 7. Engage with telecom providers to understand the prevalence of Unisoc chipsets in their networks and collaborate on threat intelligence sharing.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Unisoc
- Date Reserved
- 2025-09-28T07:27:04.796Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 692d4907e7f98a81a7fa7886
Added to database: 12/1/2025, 7:51:35 AM
Last enriched: 12/8/2025, 8:46:01 AM
Last updated: 1/18/2026, 4:15:11 AM
Views: 25
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1109: Buffer Overflow in cijliu librtsp
MediumCVE-2026-1107: Unrestricted Upload in EyouCMS
MediumCVE-2026-1106: Improper Authorization in Chamilo LMS
MediumCVE-2026-1105: SQL Injection in EasyCMS
MediumCVE-2026-1066: Command Injection in kalcaddle kodbox
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.