Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-61610: cwe-20 Improper Input Validation in Unisoc (Shanghai) Technologies Co., Ltd. T8100/T9100/T8200/T8300

0
High
VulnerabilityCVE-2025-61610cvecve-2025-61610cwe-20
Published: Mon Dec 01 2025 (12/01/2025, 07:36:02 UTC)
Source: CVE Database V5
Vendor/Project: Unisoc (Shanghai) Technologies Co., Ltd.
Product: T8100/T9100/T8200/T8300

Description

In nr modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service with no additional execution privileges needed

AI-Powered Analysis

AILast updated: 12/01/2025, 07:53:01 UTC

Technical Analysis

CVE-2025-61610 is a vulnerability identified in the NR (New Radio) modem component of Unisoc (Shanghai) Technologies Co., Ltd.'s T8100, T9100, T8200, and T8300 chipsets. These chipsets are integrated into various mobile devices running Android versions 13 through 16. The root cause of the vulnerability is improper input validation (CWE-20), which allows specially crafted remote inputs to cause a system crash. This leads to a denial of service (DoS) condition without requiring any authentication or user interaction, making exploitation straightforward over the network. The vulnerability affects the availability of the device by crashing the modem subsystem, potentially disrupting cellular connectivity and device functionality. The CVSS v3.1 base score is 7.5, reflecting a high severity due to network attack vector, low attack complexity, no privileges required, and no user interaction needed. While there are no known exploits in the wild yet, the vulnerability poses a significant risk to devices using these chipsets, especially in environments where continuous connectivity is critical. No patches have been published at the time of disclosure, so mitigation relies on network controls and monitoring. The vulnerability does not impact confidentiality or integrity but can cause service outages, which may affect user experience and operational continuity in affected devices.

Potential Impact

For European organizations, the primary impact of CVE-2025-61610 is the potential for remote denial of service on mobile devices using Unisoc T8100/T9100/T8200/T8300 chipsets. This can disrupt cellular connectivity, affecting communication, data access, and mobile-dependent operations. Critical sectors such as telecommunications, emergency services, finance, and government agencies relying on mobile networks could experience operational interruptions. The vulnerability could also impact IoT devices and embedded systems using these chipsets, potentially affecting industrial control systems or smart city infrastructure. Although the vulnerability does not compromise data confidentiality or integrity, the loss of availability can lead to productivity losses, service downtime, and increased operational risk. The ease of exploitation without authentication or user interaction increases the threat level, especially in environments with exposed network interfaces. Organizations with mobile fleets or BYOD policies should be aware of this risk and prepare incident response plans for potential DoS scenarios.

Mitigation Recommendations

1. Monitor vendor communications closely for official patches or firmware updates addressing this vulnerability and apply them promptly once available. 2. Implement network-level filtering and intrusion prevention systems (IPS) to detect and block malformed or suspicious NR modem traffic that could trigger the crash. 3. Employ mobile device management (MDM) solutions to monitor device health and automate patch deployment when updates are released. 4. Restrict network exposure of vulnerable devices by limiting access to trusted networks and using VPNs or private APNs where possible. 5. Conduct regular security assessments and penetration testing focusing on mobile network components to identify potential exploitation attempts. 6. Educate users and IT staff about signs of device instability or unexpected reboots that may indicate exploitation attempts. 7. Collaborate with telecom providers to understand the deployment footprint of Unisoc chipsets and coordinate mitigation efforts. 8. Prepare incident response plans specifically addressing denial of service scenarios affecting mobile connectivity.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Unisoc
Date Reserved
2025-09-28T07:27:04.797Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 692d4907e7f98a81a7fa788c

Added to database: 12/1/2025, 7:51:35 AM

Last enriched: 12/1/2025, 7:53:01 AM

Last updated: 12/1/2025, 5:28:13 PM

Views: 38

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats