CVE-2025-69279: cwe-20 Improper Input Validation in Unisoc (Shanghai) Technologies Co., Ltd. T8100/T9100/T8200/T8300
In nr modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service with no additional execution privileges needed.
AI Analysis
Technical Summary
CVE-2025-69279 is a vulnerability identified in the NR (New Radio) modem firmware of Unisoc (Shanghai) Technologies Co., Ltd. chipsets T8100, T9100, T8200, and T8300. These chipsets are integrated into various Android devices running versions 13 through 16. The root cause is improper input validation (CWE-20) within the modem software, which can be triggered remotely without requiring any authentication or user interaction. Exploiting this flaw allows an attacker to cause a system crash, effectively resulting in a remote denial of service (DoS). The vulnerability does not compromise confidentiality or integrity but severely impacts availability. The CVSS v3.1 base score is 7.5, with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and unchanged scope (S:U). No known exploits have been reported in the wild, and no official patches have been released as of the publication date. The affected chipsets are commonly used in mid-range to budget Android smartphones, particularly in markets where Unisoc is a prominent supplier. The vulnerability's exploitation could disrupt mobile communications and device functionality, impacting end-users and enterprise environments relying on these devices for connectivity.
Potential Impact
The primary impact of CVE-2025-69279 is the disruption of device availability through remote denial of service attacks. This can lead to temporary or persistent system crashes on affected devices, rendering them unusable until rebooted or repaired. For individual users, this results in loss of mobile connectivity and device functionality. For organizations, especially those relying on mobile devices for critical communications, this could interrupt business operations, emergency response, or remote work capabilities. The lack of required privileges or user interaction lowers the barrier for attackers, increasing the risk of widespread exploitation. Although no data confidentiality or integrity is compromised, the availability impact can have cascading effects on network reliability and user trust. The absence of patches at the time of disclosure means that affected devices remain vulnerable, potentially for extended periods. The threat is particularly significant in regions with high adoption of Unisoc-powered devices, where attackers could leverage this vulnerability to disrupt large user bases or targeted sectors such as telecommunications, government, and critical infrastructure.
Mitigation Recommendations
1. Monitor vendor communications closely for official patches or firmware updates addressing this vulnerability and apply them promptly once available. 2. Implement network-level protections such as firewall rules or intrusion prevention systems to restrict unsolicited or suspicious traffic to the NR modem interfaces, limiting exposure to remote attacks. 3. For enterprise-managed devices, consider deploying mobile device management (MDM) solutions to enforce security policies and remotely manage updates. 4. Encourage users to reboot devices if unexplained crashes occur, as this may temporarily restore functionality until a patch is applied. 5. Collaborate with mobile network operators to detect and mitigate anomalous traffic patterns targeting Unisoc chipsets. 6. Conduct security awareness training to inform users about potential device instability and encourage reporting of issues. 7. Evaluate device procurement strategies to prioritize hardware with timely security support and proven patch management. 8. In high-risk environments, consider network segmentation or use of alternative communication devices until the vulnerability is resolved.
Affected Countries
China, India, Indonesia, Russia, Vietnam, Nigeria, Brazil, Egypt, Mexico, Philippines
CVE-2025-69279: cwe-20 Improper Input Validation in Unisoc (Shanghai) Technologies Co., Ltd. T8100/T9100/T8200/T8300
Description
In nr modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service with no additional execution privileges needed.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-69279 is a vulnerability identified in the NR (New Radio) modem firmware of Unisoc (Shanghai) Technologies Co., Ltd. chipsets T8100, T9100, T8200, and T8300. These chipsets are integrated into various Android devices running versions 13 through 16. The root cause is improper input validation (CWE-20) within the modem software, which can be triggered remotely without requiring any authentication or user interaction. Exploiting this flaw allows an attacker to cause a system crash, effectively resulting in a remote denial of service (DoS). The vulnerability does not compromise confidentiality or integrity but severely impacts availability. The CVSS v3.1 base score is 7.5, with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and unchanged scope (S:U). No known exploits have been reported in the wild, and no official patches have been released as of the publication date. The affected chipsets are commonly used in mid-range to budget Android smartphones, particularly in markets where Unisoc is a prominent supplier. The vulnerability's exploitation could disrupt mobile communications and device functionality, impacting end-users and enterprise environments relying on these devices for connectivity.
Potential Impact
The primary impact of CVE-2025-69279 is the disruption of device availability through remote denial of service attacks. This can lead to temporary or persistent system crashes on affected devices, rendering them unusable until rebooted or repaired. For individual users, this results in loss of mobile connectivity and device functionality. For organizations, especially those relying on mobile devices for critical communications, this could interrupt business operations, emergency response, or remote work capabilities. The lack of required privileges or user interaction lowers the barrier for attackers, increasing the risk of widespread exploitation. Although no data confidentiality or integrity is compromised, the availability impact can have cascading effects on network reliability and user trust. The absence of patches at the time of disclosure means that affected devices remain vulnerable, potentially for extended periods. The threat is particularly significant in regions with high adoption of Unisoc-powered devices, where attackers could leverage this vulnerability to disrupt large user bases or targeted sectors such as telecommunications, government, and critical infrastructure.
Mitigation Recommendations
1. Monitor vendor communications closely for official patches or firmware updates addressing this vulnerability and apply them promptly once available. 2. Implement network-level protections such as firewall rules or intrusion prevention systems to restrict unsolicited or suspicious traffic to the NR modem interfaces, limiting exposure to remote attacks. 3. For enterprise-managed devices, consider deploying mobile device management (MDM) solutions to enforce security policies and remotely manage updates. 4. Encourage users to reboot devices if unexplained crashes occur, as this may temporarily restore functionality until a patch is applied. 5. Collaborate with mobile network operators to detect and mitigate anomalous traffic patterns targeting Unisoc chipsets. 6. Conduct security awareness training to inform users about potential device instability and encourage reporting of issues. 7. Evaluate device procurement strategies to prioritize hardware with timely security support and proven patch management. 8. In high-risk environments, consider network segmentation or use of alternative communication devices until the vulnerability is resolved.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Unisoc
- Date Reserved
- 2025-12-31T07:40:55.475Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69ae8de22904315ca3e9d00f
Added to database: 3/9/2026, 9:07:46 AM
Last enriched: 3/16/2026, 9:45:18 AM
Last updated: 4/25/2026, 8:18:03 AM
Views: 84
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.