Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-61608: cwe-20 Improper Input Validation in Unisoc (Shanghai) Technologies Co., Ltd. T8100/T9100/T8200/T8300

0
High
VulnerabilityCVE-2025-61608cvecve-2025-61608cwe-20
Published: Mon Dec 01 2025 (12/01/2025, 07:36:00 UTC)
Source: CVE Database V5
Vendor/Project: Unisoc (Shanghai) Technologies Co., Ltd.
Product: T8100/T9100/T8200/T8300

Description

In nr modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service with no additional execution privileges needed

AI-Powered Analysis

AILast updated: 12/08/2025, 08:46:01 UTC

Technical Analysis

CVE-2025-61608 identifies a vulnerability in the NR (New Radio) modem component of Unisoc (Shanghai) Technologies Co., Ltd. chipsets T8100, T9100, T8200, and T8300, which are integrated into Android devices running versions 13 through 16. The root cause is improper input validation (CWE-20), where the modem fails to correctly validate certain inputs, allowing specially crafted remote inputs to trigger a system crash. This leads to a denial of service condition without requiring any privileges or user interaction, making it remotely exploitable over the network. The vulnerability impacts the availability of the device by causing it to become unresponsive or reboot, disrupting normal operations. The CVSS v3.1 score of 7.5 reflects a high severity due to network attack vector, low attack complexity, no privileges required, and no user interaction needed, with impact focused solely on availability. No known exploits have been reported in the wild, and no official patches have been released as of the publication date. The vulnerability affects a broad range of Android versions, indicating a potentially wide attack surface. Given the critical role of modems in mobile communications, exploitation could disrupt voice, data, and emergency services on affected devices.

Potential Impact

For European organizations, the primary impact is the potential disruption of mobile device availability, which can affect business continuity, especially in sectors relying heavily on mobile communications such as finance, healthcare, emergency services, and critical infrastructure. The denial of service could interrupt communications, delay operations, and degrade user trust. While confidentiality and integrity are not directly impacted, the loss of availability can have cascading effects on operational processes and incident response capabilities. Organizations with employees or assets using devices powered by Unisoc T8100/T9100/T8200/T8300 chipsets running Android 13-16 are at risk. Telecommunications providers and enterprises deploying mobile endpoints in Europe must consider the risk of targeted remote DoS attacks, which could be leveraged by threat actors to cause service outages or distractions during broader attack campaigns. The lack of current exploits provides a window for proactive mitigation, but the absence of patches increases urgency for interim protective measures.

Mitigation Recommendations

1. Implement network-level filtering and anomaly detection to identify and block malformed or suspicious NR modem inputs that could trigger the vulnerability. 2. Coordinate with device manufacturers and Unisoc for timely updates and patches; prioritize patch deployment as soon as they become available. 3. Monitor device logs and network traffic for signs of repeated modem crashes or unusual connectivity disruptions indicative of exploitation attempts. 4. Employ mobile device management (MDM) solutions to enforce security policies and facilitate rapid response to affected devices. 5. Educate users and IT staff about the symptoms of modem-related DoS and establish incident response protocols to isolate and remediate affected devices quickly. 6. Where feasible, restrict exposure of vulnerable devices to untrusted networks or implement VPNs and secure tunnels to reduce attack surface. 7. Engage with telecom providers to understand the prevalence of Unisoc chipsets in their networks and collaborate on threat intelligence sharing.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Unisoc
Date Reserved
2025-09-28T07:27:04.796Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 692d4907e7f98a81a7fa7886

Added to database: 12/1/2025, 7:51:35 AM

Last enriched: 12/8/2025, 8:46:01 AM

Last updated: 1/18/2026, 4:15:11 AM

Views: 25

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats