CVE-2025-61610: cwe-20 Improper Input Validation in Unisoc (Shanghai) Technologies Co., Ltd. T8100/T9100/T8200/T8300
In nr modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service with no additional execution privileges needed
AI Analysis
Technical Summary
CVE-2025-61610 is a vulnerability identified in the NR (New Radio) modem firmware of Unisoc (Shanghai) Technologies Co., Ltd. chipsets T8100, T9100, T8200, and T8300. These chipsets are integrated into mobile devices running Android versions 13 through 16. The root cause is improper input validation (CWE-20) within the modem's processing of incoming data, which can be exploited remotely over the network without requiring any authentication or user interaction. Exploitation leads to a system crash, causing a denial of service (DoS) condition on the affected device. The CVSS v3.1 base score is 7.5, reflecting a high severity primarily due to the network attack vector, low attack complexity, and the complete lack of required privileges or user interaction. The vulnerability affects the availability of the device but does not compromise confidentiality or integrity. No known exploits have been reported in the wild, and no patches have been released at the time of publication. The vulnerability is significant because the NR modem is critical for cellular communication, and a crash could disrupt voice, data, and emergency services. The lack of execution privileges needed for exploitation increases the risk profile, as attackers can trigger the DoS remotely. The vulnerability was reserved in late September 2025 and published in December 2025, indicating recent discovery and disclosure. The absence of patch links suggests that vendors and device manufacturers may still be developing mitigations. This vulnerability highlights the importance of robust input validation in modem firmware, especially as 5G NR technology becomes ubiquitous in mobile devices.
Potential Impact
For European organizations, the primary impact of CVE-2025-61610 is on the availability of mobile devices and potentially critical communication infrastructure relying on Unisoc chipsets. Organizations with mobile workforces or IoT deployments using affected devices may experience service disruptions due to modem crashes, impacting business continuity and operational efficiency. Telecommunications providers using Unisoc-based equipment could face network instability or degraded service quality. Emergency services and critical infrastructure relying on mobile connectivity could be particularly vulnerable to denial of service conditions, which may have safety implications. Although the vulnerability does not allow data theft or privilege escalation, the ability to remotely crash devices without authentication makes it a potent vector for targeted or widespread disruption attacks. The lack of known exploits in the wild currently reduces immediate risk, but the high severity score and ease of exploitation mean that attackers may develop exploits rapidly. European organizations must consider the potential for cascading effects on supply chains and mobile-dependent services. The impact is heightened in sectors such as finance, healthcare, and government, where mobile device availability is critical.
Mitigation Recommendations
1. Conduct a comprehensive inventory of all mobile devices and embedded systems using Unisoc T8100, T9100, T8200, or T8300 chipsets running Android 13 to 16 to identify at-risk assets. 2. Monitor vendor communications and security advisories from Unisoc and device manufacturers for patches or firmware updates addressing CVE-2025-61610 and apply them promptly upon release. 3. Implement network-level filtering and anomaly detection to identify and block suspicious NR modem traffic patterns that could trigger the vulnerability, especially from untrusted external sources. 4. Employ mobile device management (MDM) solutions to enforce security policies, restrict unnecessary network access, and enable rapid response to device crashes or instability. 5. Develop incident response plans that include procedures for handling modem-related denial of service events, ensuring continuity of critical communications. 6. Collaborate with telecommunications providers to understand the deployment of Unisoc chipsets in network equipment and coordinate mitigation efforts. 7. Educate users and administrators about the vulnerability and encourage reporting of unusual device behavior. 8. Consider network segmentation and redundancy for critical mobile-dependent systems to minimize impact from device outages. 9. Evaluate alternative hardware platforms for future deployments to reduce reliance on vulnerable chipsets. 10. Maintain up-to-date backups and recovery mechanisms for affected systems to reduce downtime in case of exploitation.
Affected Countries
Germany, France, Italy, Spain, United Kingdom, Netherlands, Poland, Sweden
CVE-2025-61610: cwe-20 Improper Input Validation in Unisoc (Shanghai) Technologies Co., Ltd. T8100/T9100/T8200/T8300
Description
In nr modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service with no additional execution privileges needed
AI-Powered Analysis
Technical Analysis
CVE-2025-61610 is a vulnerability identified in the NR (New Radio) modem firmware of Unisoc (Shanghai) Technologies Co., Ltd. chipsets T8100, T9100, T8200, and T8300. These chipsets are integrated into mobile devices running Android versions 13 through 16. The root cause is improper input validation (CWE-20) within the modem's processing of incoming data, which can be exploited remotely over the network without requiring any authentication or user interaction. Exploitation leads to a system crash, causing a denial of service (DoS) condition on the affected device. The CVSS v3.1 base score is 7.5, reflecting a high severity primarily due to the network attack vector, low attack complexity, and the complete lack of required privileges or user interaction. The vulnerability affects the availability of the device but does not compromise confidentiality or integrity. No known exploits have been reported in the wild, and no patches have been released at the time of publication. The vulnerability is significant because the NR modem is critical for cellular communication, and a crash could disrupt voice, data, and emergency services. The lack of execution privileges needed for exploitation increases the risk profile, as attackers can trigger the DoS remotely. The vulnerability was reserved in late September 2025 and published in December 2025, indicating recent discovery and disclosure. The absence of patch links suggests that vendors and device manufacturers may still be developing mitigations. This vulnerability highlights the importance of robust input validation in modem firmware, especially as 5G NR technology becomes ubiquitous in mobile devices.
Potential Impact
For European organizations, the primary impact of CVE-2025-61610 is on the availability of mobile devices and potentially critical communication infrastructure relying on Unisoc chipsets. Organizations with mobile workforces or IoT deployments using affected devices may experience service disruptions due to modem crashes, impacting business continuity and operational efficiency. Telecommunications providers using Unisoc-based equipment could face network instability or degraded service quality. Emergency services and critical infrastructure relying on mobile connectivity could be particularly vulnerable to denial of service conditions, which may have safety implications. Although the vulnerability does not allow data theft or privilege escalation, the ability to remotely crash devices without authentication makes it a potent vector for targeted or widespread disruption attacks. The lack of known exploits in the wild currently reduces immediate risk, but the high severity score and ease of exploitation mean that attackers may develop exploits rapidly. European organizations must consider the potential for cascading effects on supply chains and mobile-dependent services. The impact is heightened in sectors such as finance, healthcare, and government, where mobile device availability is critical.
Mitigation Recommendations
1. Conduct a comprehensive inventory of all mobile devices and embedded systems using Unisoc T8100, T9100, T8200, or T8300 chipsets running Android 13 to 16 to identify at-risk assets. 2. Monitor vendor communications and security advisories from Unisoc and device manufacturers for patches or firmware updates addressing CVE-2025-61610 and apply them promptly upon release. 3. Implement network-level filtering and anomaly detection to identify and block suspicious NR modem traffic patterns that could trigger the vulnerability, especially from untrusted external sources. 4. Employ mobile device management (MDM) solutions to enforce security policies, restrict unnecessary network access, and enable rapid response to device crashes or instability. 5. Develop incident response plans that include procedures for handling modem-related denial of service events, ensuring continuity of critical communications. 6. Collaborate with telecommunications providers to understand the deployment of Unisoc chipsets in network equipment and coordinate mitigation efforts. 7. Educate users and administrators about the vulnerability and encourage reporting of unusual device behavior. 8. Consider network segmentation and redundancy for critical mobile-dependent systems to minimize impact from device outages. 9. Evaluate alternative hardware platforms for future deployments to reduce reliance on vulnerable chipsets. 10. Maintain up-to-date backups and recovery mechanisms for affected systems to reduce downtime in case of exploitation.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Unisoc
- Date Reserved
- 2025-09-28T07:27:04.797Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 692d4907e7f98a81a7fa788c
Added to database: 12/1/2025, 7:51:35 AM
Last enriched: 12/8/2025, 8:46:37 AM
Last updated: 1/15/2026, 10:57:01 PM
Views: 92
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1008: CWE-79 Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) in Altium Altium 365
MediumCVE-2026-0915: CWE-908 Use of Uninitialized Resource in The GNU C Library glibc
MediumCVE-2025-67822: n/a
UnknownCVE-2025-59959: CWE-822 Untrusted Pointer Dereference in Juniper Networks Junos OS
MediumCVE-2025-52987: CWE-1021 Improper Restriction of Rendered UI Layers or Frames in Juniper Networks Paragon Automation (Pathfinder, Planner, Insights)
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.