CVE-2025-61615: cwe-20 Improper Input Validation in Unisoc (Shanghai) Technologies Co., Ltd. T8100/T9100/T8200/T8300
In nr modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service with no additional execution privileges needed.
AI Analysis
Technical Summary
CVE-2025-61615 is a vulnerability identified in the NR (New Radio) modem firmware of Unisoc (Shanghai) Technologies Co., Ltd. chipsets T8100, T9100, T8200, and T8300. These chipsets are integrated into various Android devices running versions 13 through 16. The root cause is improper input validation (CWE-20) within the modem's processing of network data, which can be manipulated by an attacker remotely to trigger a system crash. This crash leads to a denial of service condition, disrupting normal device operation without requiring any privileges or user interaction. The vulnerability does not affect confidentiality or integrity but severely impacts availability. The CVSS v3.1 score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) indicates that the attack can be launched over the network with low complexity and no authentication, making it a significant risk for affected devices. Although no exploits have been observed in the wild and no patches are currently available, the vulnerability's presence in widely used chipsets embedded in mobile devices makes it a critical concern for device manufacturers, network operators, and end users. The lack of patches necessitates interim mitigations and heightened monitoring until a fix is released.
Potential Impact
The primary impact of CVE-2025-61615 is a remote denial of service on devices using affected Unisoc chipsets, which can cause system crashes and device unavailability. This can disrupt communications, especially for users relying on mobile networks for critical services. Enterprises deploying large fleets of Android devices with these chipsets may experience operational interruptions, impacting productivity and service delivery. The vulnerability does not allow data theft or privilege escalation, limiting its impact to availability. However, widespread exploitation could lead to network congestion or targeted attacks against specific user groups or regions. The ease of remote exploitation without authentication increases the risk of automated attacks. The absence of patches prolongs exposure, potentially affecting millions of devices globally, especially in regions where Unisoc chipsets have significant market penetration.
Mitigation Recommendations
1. Monitor vendor advisories closely for official patches or firmware updates addressing this vulnerability and apply them promptly once available. 2. Implement network-level filtering to restrict or monitor suspicious NR modem traffic that could trigger the vulnerability, using anomaly detection systems. 3. Employ mobile device management (MDM) solutions to detect and isolate affected devices exhibiting crash symptoms or instability. 4. Encourage users to reboot devices regularly to recover from potential crashes and reduce persistent denial of service. 5. Collaborate with mobile network operators to identify and block exploit attempts at the network edge. 6. For organizations deploying custom ROMs or firmware, consider additional input validation checks in the modem stack as a temporary mitigation. 7. Educate users about the risk and advise caution when connecting to untrusted networks until patches are available.
Affected Countries
China, India, Indonesia, Vietnam, Russia, Nigeria, Bangladesh, Pakistan, Egypt, Brazil, Mexico
CVE-2025-61615: cwe-20 Improper Input Validation in Unisoc (Shanghai) Technologies Co., Ltd. T8100/T9100/T8200/T8300
Description
In nr modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service with no additional execution privileges needed.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-61615 is a vulnerability identified in the NR (New Radio) modem firmware of Unisoc (Shanghai) Technologies Co., Ltd. chipsets T8100, T9100, T8200, and T8300. These chipsets are integrated into various Android devices running versions 13 through 16. The root cause is improper input validation (CWE-20) within the modem's processing of network data, which can be manipulated by an attacker remotely to trigger a system crash. This crash leads to a denial of service condition, disrupting normal device operation without requiring any privileges or user interaction. The vulnerability does not affect confidentiality or integrity but severely impacts availability. The CVSS v3.1 score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) indicates that the attack can be launched over the network with low complexity and no authentication, making it a significant risk for affected devices. Although no exploits have been observed in the wild and no patches are currently available, the vulnerability's presence in widely used chipsets embedded in mobile devices makes it a critical concern for device manufacturers, network operators, and end users. The lack of patches necessitates interim mitigations and heightened monitoring until a fix is released.
Potential Impact
The primary impact of CVE-2025-61615 is a remote denial of service on devices using affected Unisoc chipsets, which can cause system crashes and device unavailability. This can disrupt communications, especially for users relying on mobile networks for critical services. Enterprises deploying large fleets of Android devices with these chipsets may experience operational interruptions, impacting productivity and service delivery. The vulnerability does not allow data theft or privilege escalation, limiting its impact to availability. However, widespread exploitation could lead to network congestion or targeted attacks against specific user groups or regions. The ease of remote exploitation without authentication increases the risk of automated attacks. The absence of patches prolongs exposure, potentially affecting millions of devices globally, especially in regions where Unisoc chipsets have significant market penetration.
Mitigation Recommendations
1. Monitor vendor advisories closely for official patches or firmware updates addressing this vulnerability and apply them promptly once available. 2. Implement network-level filtering to restrict or monitor suspicious NR modem traffic that could trigger the vulnerability, using anomaly detection systems. 3. Employ mobile device management (MDM) solutions to detect and isolate affected devices exhibiting crash symptoms or instability. 4. Encourage users to reboot devices regularly to recover from potential crashes and reduce persistent denial of service. 5. Collaborate with mobile network operators to identify and block exploit attempts at the network edge. 6. For organizations deploying custom ROMs or firmware, consider additional input validation checks in the modem stack as a temporary mitigation. 7. Educate users about the risk and advise caution when connecting to untrusted networks until patches are available.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Unisoc
- Date Reserved
- 2025-09-28T07:27:04.799Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69ae8de22904315ca3e9d006
Added to database: 3/9/2026, 9:07:46 AM
Last enriched: 3/16/2026, 9:44:24 AM
Last updated: 4/28/2026, 5:14:50 AM
Views: 73
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.