Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-61617: cwe-20 Improper Input Validation in Unisoc (Shanghai) Technologies Co., Ltd. T8100/T9100/T8200/T8300

0
High
VulnerabilityCVE-2025-61617cvecve-2025-61617cwe-20
Published: Mon Dec 01 2025 (12/01/2025, 07:35:56 UTC)
Source: CVE Database V5
Vendor/Project: Unisoc (Shanghai) Technologies Co., Ltd.
Product: T8100/T9100/T8200/T8300

Description

In nr modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service with no additional execution privileges needed

AI-Powered Analysis

AILast updated: 12/01/2025, 07:52:43 UTC

Technical Analysis

CVE-2025-61617 is a vulnerability identified in the NR (New Radio) modem firmware of Unisoc (Shanghai) Technologies Co., Ltd. chipsets T8100, T9100, T8200, and T8300. These chipsets are commonly integrated into various mobile devices running Android versions 13 through 16. The root cause is improper input validation (CWE-20) within the modem's processing of network data, which can be exploited remotely over the network without requiring any privileges or user interaction. Exploiting this flaw allows an attacker to trigger a system crash, leading to a denial of service condition on the affected device. This disrupts the availability of the device's cellular connectivity and potentially other dependent services. The vulnerability does not allow for code execution or data compromise, focusing solely on availability impact. The CVSS v3.1 base score is 7.5, with vector AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H, indicating a network attack vector, low complexity, no privileges or user interaction required, unchanged scope, no confidentiality or integrity impact, but high availability impact. No public exploits have been reported yet, and no patches are currently linked, suggesting that vendors and users should monitor for updates. The vulnerability affects a broad range of Android versions, increasing the scope of potentially impacted devices globally. Given the critical role of modems in mobile communications, this vulnerability poses a significant risk to device uptime and service continuity.

Potential Impact

For European organizations, the primary impact of CVE-2025-61617 is the potential disruption of mobile communications due to denial of service on devices using affected Unisoc chipsets. This can affect employees relying on mobile connectivity for business operations, IoT deployments using cellular networks, and critical infrastructure communications. Telecommunications providers using Unisoc-based equipment may experience service degradation or outages, impacting customer experience and operational reliability. The inability to maintain stable network connections can hinder remote work, emergency services, and real-time data transmission. While confidentiality and integrity are not directly compromised, the availability impact can lead to operational downtime and financial losses. Organizations dependent on mobile broadband or private LTE/5G networks incorporating these chipsets should be particularly vigilant. The lack of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits once the vulnerability becomes widely known.

Mitigation Recommendations

1. Monitor vendor advisories from Unisoc and device manufacturers for patches addressing CVE-2025-61617 and apply updates promptly once available. 2. Implement network-level filtering to detect and block malformed or suspicious NR modem traffic patterns that could trigger the vulnerability. 3. Employ mobile device management (MDM) solutions to enforce timely OS and firmware updates across enterprise devices. 4. Conduct network segmentation to isolate critical systems from mobile network disruptions. 5. Use redundancy in communication channels to mitigate the impact of potential mobile network outages. 6. Engage with telecom providers to understand their mitigation strategies and ensure they are aware of this vulnerability. 7. Perform security testing on devices incorporating affected chipsets to identify susceptibility and validate mitigations. 8. Educate IT and security teams about the vulnerability’s characteristics to improve detection and incident response readiness.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Unisoc
Date Reserved
2025-09-28T07:27:04.799Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 692d4907e7f98a81a7fa788f

Added to database: 12/1/2025, 7:51:35 AM

Last enriched: 12/1/2025, 7:52:43 AM

Last updated: 12/4/2025, 4:16:49 PM

Views: 31

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats