Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-61609: cwe-20 Improper Input Validation in Unisoc (Shanghai) Technologies Co., Ltd. T8100/T9100/T8200/T8300

0
High
VulnerabilityCVE-2025-61609cvecve-2025-61609cwe-20
Published: Mon Dec 01 2025 (12/01/2025, 07:36:01 UTC)
Source: CVE Database V5
Vendor/Project: Unisoc (Shanghai) Technologies Co., Ltd.
Product: T8100/T9100/T8200/T8300

Description

In modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service with no additional execution privileges needed

AI-Powered Analysis

AILast updated: 12/08/2025, 08:46:15 UTC

Technical Analysis

CVE-2025-61609 identifies a vulnerability in the modem components of Unisoc (Shanghai) Technologies Co., Ltd. chipsets T8100, T9100, T8200, and T8300, which are integrated into devices running Android versions 13 through 16. The root cause is improper input validation (CWE-20) within the modem firmware or software stack. This flaw allows an unauthenticated remote attacker to send specially crafted inputs to the modem, triggering a system crash that leads to a denial of service condition. The vulnerability does not grant the attacker any additional execution privileges, nor does it compromise confidentiality or integrity directly; its impact is confined to availability. The CVSS v3.1 score of 7.5 reflects the high severity due to network attack vector, low attack complexity, no privileges required, and no user interaction needed. The scope is unchanged, meaning the vulnerability affects only the vulnerable component without extending to other system components. Currently, there are no known exploits in the wild, and no patches have been released, indicating that affected organizations must rely on compensating controls until official fixes are available. The vulnerability's presence in modem chipsets embedded in mobile and IoT devices means that exploitation could disrupt cellular connectivity, impacting communication services and potentially causing cascading effects in dependent systems.

Potential Impact

For European organizations, the primary impact of CVE-2025-61609 is the potential disruption of cellular communication services due to modem crashes. This can affect mobile devices, IoT endpoints, and network equipment using Unisoc chipsets, leading to denial of service conditions that impair business operations, emergency communications, and critical infrastructure monitoring. Telecommunications providers may experience service degradation or outages, affecting customer trust and regulatory compliance. Enterprises relying on mobile connectivity for remote work, logistics, or industrial control systems could face operational interruptions. The lack of privilege escalation limits data breach risks, but availability impacts can be severe, especially in sectors like healthcare, transportation, and public safety. The absence of known exploits reduces immediate risk but does not eliminate the threat, as attackers may develop exploits once the vulnerability becomes widely known. The broad Android version range affected increases the scope of vulnerable devices across Europe.

Mitigation Recommendations

1. Monitor network traffic for unusual or malformed packets targeting modem interfaces to detect potential exploitation attempts. 2. Implement network-level filtering and intrusion prevention systems to block suspicious inputs directed at devices with Unisoc chipsets. 3. Coordinate with device manufacturers and vendors to obtain and apply firmware or software updates as soon as patches are released. 4. For critical systems, consider isolating vulnerable devices from untrusted networks or limiting their exposure to external traffic. 5. Maintain an inventory of devices using affected Unisoc chipsets to prioritize risk assessment and mitigation efforts. 6. Employ redundancy and failover mechanisms in communication infrastructure to minimize impact from potential modem outages. 7. Educate IT and security teams about the vulnerability to ensure rapid response to any signs of exploitation. 8. Engage with telecom providers to understand their mitigation strategies and ensure alignment with organizational risk management.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Unisoc
Date Reserved
2025-09-28T07:27:04.797Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 692d4907e7f98a81a7fa7889

Added to database: 12/1/2025, 7:51:35 AM

Last enriched: 12/8/2025, 8:46:15 AM

Last updated: 1/17/2026, 7:44:32 PM

Views: 75

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats