CVE-2025-61618: cwe-20 Improper Input Validation in Unisoc (Shanghai) Technologies Co., Ltd. T8100/T9100/T8200/T8300
In nr modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service with no additional execution privileges needed
AI Analysis
Technical Summary
CVE-2025-61618 is a vulnerability identified in the NR (New Radio) modem component of Unisoc (Shanghai) Technologies Co., Ltd. chipsets T8100, T9100, T8200, and T8300. These chipsets are integrated into Android devices running versions 13 through 16. The root cause is improper input validation (CWE-20) within the modem firmware or software stack. This flaw allows an unauthenticated remote attacker to send specially crafted inputs to the modem, triggering a system crash. The crash leads to a denial of service (DoS) condition, disrupting device availability without granting any additional privileges or access to sensitive data. The vulnerability requires no user interaction and can be exploited over the network, making it relatively easy to trigger. Although no exploits have been reported in the wild yet, the potential for disruption is significant, especially for devices relying on these chipsets for cellular connectivity. The CVSS v3.1 score of 7.5 reflects a high severity rating, driven by the network attack vector, low attack complexity, no privileges required, and no user interaction needed. The scope is unchanged, as the impact is limited to the affected device. The vulnerability does not affect confidentiality or integrity but severely impacts availability by causing system crashes. No official patches or firmware updates have been linked yet, so mitigation depends on vendor response and interim protective measures.
Potential Impact
For European organizations, the primary impact of CVE-2025-61618 is the potential disruption of mobile communications and device availability. Organizations relying on Unisoc chipset-based Android devices for critical communications, mobile workforce operations, or IoT deployments may experience service interruptions due to modem crashes. This can affect sectors such as telecommunications, emergency services, transportation, and industrial control systems that utilize mobile connectivity. The denial of service condition could lead to operational downtime, loss of productivity, and increased support costs. Additionally, widespread exploitation could strain network resources and complicate incident response efforts. While confidentiality and integrity are not directly impacted, the loss of availability can indirectly affect business continuity and safety-critical functions. European telecom providers and enterprises using devices with these chipsets should be particularly vigilant. The absence of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits once the vulnerability details become widely known.
Mitigation Recommendations
1. Monitor vendor announcements closely for firmware or software patches addressing this vulnerability and apply updates promptly once available. 2. Engage with device manufacturers and mobile network operators to confirm the presence of affected chipsets and coordinate patch deployment. 3. Implement network-level filtering and anomaly detection to identify and block suspicious NR modem traffic patterns that could exploit this vulnerability. 4. Employ mobile device management (MDM) solutions to enforce security policies and monitor device health and connectivity status. 5. For critical infrastructure, consider deploying redundant communication paths or failover mechanisms to mitigate potential service disruptions. 6. Educate IT and security teams about this vulnerability to ensure rapid detection and response to any signs of exploitation. 7. Collaborate with telecom providers to gain visibility into network-level events that may indicate exploitation attempts. 8. Avoid deploying unpatched devices in high-risk or sensitive environments until mitigations are in place.
Affected Countries
Germany, France, Italy, Spain, United Kingdom, Netherlands, Poland, Sweden
CVE-2025-61618: cwe-20 Improper Input Validation in Unisoc (Shanghai) Technologies Co., Ltd. T8100/T9100/T8200/T8300
Description
In nr modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service with no additional execution privileges needed
AI-Powered Analysis
Technical Analysis
CVE-2025-61618 is a vulnerability identified in the NR (New Radio) modem component of Unisoc (Shanghai) Technologies Co., Ltd. chipsets T8100, T9100, T8200, and T8300. These chipsets are integrated into Android devices running versions 13 through 16. The root cause is improper input validation (CWE-20) within the modem firmware or software stack. This flaw allows an unauthenticated remote attacker to send specially crafted inputs to the modem, triggering a system crash. The crash leads to a denial of service (DoS) condition, disrupting device availability without granting any additional privileges or access to sensitive data. The vulnerability requires no user interaction and can be exploited over the network, making it relatively easy to trigger. Although no exploits have been reported in the wild yet, the potential for disruption is significant, especially for devices relying on these chipsets for cellular connectivity. The CVSS v3.1 score of 7.5 reflects a high severity rating, driven by the network attack vector, low attack complexity, no privileges required, and no user interaction needed. The scope is unchanged, as the impact is limited to the affected device. The vulnerability does not affect confidentiality or integrity but severely impacts availability by causing system crashes. No official patches or firmware updates have been linked yet, so mitigation depends on vendor response and interim protective measures.
Potential Impact
For European organizations, the primary impact of CVE-2025-61618 is the potential disruption of mobile communications and device availability. Organizations relying on Unisoc chipset-based Android devices for critical communications, mobile workforce operations, or IoT deployments may experience service interruptions due to modem crashes. This can affect sectors such as telecommunications, emergency services, transportation, and industrial control systems that utilize mobile connectivity. The denial of service condition could lead to operational downtime, loss of productivity, and increased support costs. Additionally, widespread exploitation could strain network resources and complicate incident response efforts. While confidentiality and integrity are not directly impacted, the loss of availability can indirectly affect business continuity and safety-critical functions. European telecom providers and enterprises using devices with these chipsets should be particularly vigilant. The absence of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits once the vulnerability details become widely known.
Mitigation Recommendations
1. Monitor vendor announcements closely for firmware or software patches addressing this vulnerability and apply updates promptly once available. 2. Engage with device manufacturers and mobile network operators to confirm the presence of affected chipsets and coordinate patch deployment. 3. Implement network-level filtering and anomaly detection to identify and block suspicious NR modem traffic patterns that could exploit this vulnerability. 4. Employ mobile device management (MDM) solutions to enforce security policies and monitor device health and connectivity status. 5. For critical infrastructure, consider deploying redundant communication paths or failover mechanisms to mitigate potential service disruptions. 6. Educate IT and security teams about this vulnerability to ensure rapid detection and response to any signs of exploitation. 7. Collaborate with telecom providers to gain visibility into network-level events that may indicate exploitation attempts. 8. Avoid deploying unpatched devices in high-risk or sensitive environments until mitigations are in place.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Unisoc
- Date Reserved
- 2025-09-28T07:27:04.799Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 692d4907e7f98a81a7fa7892
Added to database: 12/1/2025, 7:51:35 AM
Last enriched: 12/1/2025, 7:52:26 AM
Last updated: 12/5/2025, 1:52:00 AM
Views: 56
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-62223: CWE-451: User Interface (UI) Misrepresentation of Critical Information in Microsoft Microsoft Edge (Chromium-based)
MediumCVE-2025-14052: Improper Access Controls in youlaitech youlai-mall
MediumCVE-2025-13373: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Advantech iView
HighCVE-2025-66564: CWE-405: Asymmetric Resource Consumption (Amplification) in sigstore timestamp-authority
HighCVE-2025-66559: CWE-129: Improper Validation of Array Index in taikoxyz taiko-mono
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.