Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-61618: cwe-20 Improper Input Validation in Unisoc (Shanghai) Technologies Co., Ltd. T8100/T9100/T8200/T8300

0
High
VulnerabilityCVE-2025-61618cvecve-2025-61618cwe-20
Published: Mon Dec 01 2025 (12/01/2025, 07:35:57 UTC)
Source: CVE Database V5
Vendor/Project: Unisoc (Shanghai) Technologies Co., Ltd.
Product: T8100/T9100/T8200/T8300

Description

In nr modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service with no additional execution privileges needed

AI-Powered Analysis

AILast updated: 12/01/2025, 07:52:26 UTC

Technical Analysis

CVE-2025-61618 is a vulnerability identified in the NR (New Radio) modem component of Unisoc (Shanghai) Technologies Co., Ltd. chipsets T8100, T9100, T8200, and T8300. These chipsets are integrated into Android devices running versions 13 through 16. The root cause is improper input validation (CWE-20) within the modem firmware or software stack. This flaw allows an unauthenticated remote attacker to send specially crafted inputs to the modem, triggering a system crash. The crash leads to a denial of service (DoS) condition, disrupting device availability without granting any additional privileges or access to sensitive data. The vulnerability requires no user interaction and can be exploited over the network, making it relatively easy to trigger. Although no exploits have been reported in the wild yet, the potential for disruption is significant, especially for devices relying on these chipsets for cellular connectivity. The CVSS v3.1 score of 7.5 reflects a high severity rating, driven by the network attack vector, low attack complexity, no privileges required, and no user interaction needed. The scope is unchanged, as the impact is limited to the affected device. The vulnerability does not affect confidentiality or integrity but severely impacts availability by causing system crashes. No official patches or firmware updates have been linked yet, so mitigation depends on vendor response and interim protective measures.

Potential Impact

For European organizations, the primary impact of CVE-2025-61618 is the potential disruption of mobile communications and device availability. Organizations relying on Unisoc chipset-based Android devices for critical communications, mobile workforce operations, or IoT deployments may experience service interruptions due to modem crashes. This can affect sectors such as telecommunications, emergency services, transportation, and industrial control systems that utilize mobile connectivity. The denial of service condition could lead to operational downtime, loss of productivity, and increased support costs. Additionally, widespread exploitation could strain network resources and complicate incident response efforts. While confidentiality and integrity are not directly impacted, the loss of availability can indirectly affect business continuity and safety-critical functions. European telecom providers and enterprises using devices with these chipsets should be particularly vigilant. The absence of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits once the vulnerability details become widely known.

Mitigation Recommendations

1. Monitor vendor announcements closely for firmware or software patches addressing this vulnerability and apply updates promptly once available. 2. Engage with device manufacturers and mobile network operators to confirm the presence of affected chipsets and coordinate patch deployment. 3. Implement network-level filtering and anomaly detection to identify and block suspicious NR modem traffic patterns that could exploit this vulnerability. 4. Employ mobile device management (MDM) solutions to enforce security policies and monitor device health and connectivity status. 5. For critical infrastructure, consider deploying redundant communication paths or failover mechanisms to mitigate potential service disruptions. 6. Educate IT and security teams about this vulnerability to ensure rapid detection and response to any signs of exploitation. 7. Collaborate with telecom providers to gain visibility into network-level events that may indicate exploitation attempts. 8. Avoid deploying unpatched devices in high-risk or sensitive environments until mitigations are in place.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Unisoc
Date Reserved
2025-09-28T07:27:04.799Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 692d4907e7f98a81a7fa7892

Added to database: 12/1/2025, 7:51:35 AM

Last enriched: 12/1/2025, 7:52:26 AM

Last updated: 12/5/2025, 1:52:00 AM

Views: 56

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats