CVE-2025-61613 Overview
CVE-2025-61613 is an improper input validation vulnerability affecting the NR (New Radio) modem component in devices running Google Android with Unisoc chipsets. The vulnerability exists due to insufficient validation of input data processed by the NR modem, which could allow a remote attacker to trigger a system crash without requiring any additional execution privileges or user interaction.
This vulnerability poses a significant risk to mobile device availability, as successful exploitation could result in a complete denial of service condition, rendering affected devices temporarily unusable.
Critical Impact
Remote attackers can cause system crashes on affected Android devices with Unisoc chipsets without authentication, potentially disrupting critical communications and device functionality.
Affected Products
- Google Android versions 13.0, 14.0, 15.0, and 16.0
- Unisoc T8100 chipset
- Unisoc T8200 chipset
- Unisoc T8300 chipset
- Unisoc T9100 chipset
Discovery Timeline
- 2026-03-09 - CVE-2025-61613 published to NVD
- 2026-03-09 - Last updated in NVD database
Technical Details for CVE-2025-61613
Vulnerability Analysis
The vulnerability resides in the NR modem firmware component used in Unisoc chipsets. NR modem handles 5G New Radio communications, processing signaling data and network protocol messages. The improper input validation flaw allows malformed or specially crafted input to bypass validation checks, leading to unexpected behavior in the modem's processing logic.
When the NR modem receives malicious input that triggers this vulnerability, it fails to properly handle the erroneous data, resulting in a system-wide crash. This denial of service condition affects the entire device, not just the modem component, indicating that the modem crash propagates to cause broader system instability.
The attack requires network access but does not require any privileges on the target device or user interaction, making it particularly dangerous for mass exploitation scenarios. The vulnerability is classified under CWE-20 (Improper Input Validation), which encompasses security flaws arising from failure to properly validate input data before processing.
Root Cause
The root cause of CVE-2025-61613 is improper input validation within the NR modem component. The modem fails to adequately validate incoming data, allowing malformed input to reach processing routines that cannot safely handle unexpected values or structures. This lack of boundary checking or input sanitization enables attackers to send specially crafted data that triggers an unhandled exception or fault condition within the modem firmware.
Attack Vector
The attack vector for this vulnerability is network-based. An attacker with network access to the target device can exploit this vulnerability by sending malicious data to the NR modem component. The exploitation does not require:
- Any authentication or privileges on the target device
- User interaction or awareness
- Physical access to the device
The attacker only needs the ability to send network traffic that will be processed by the vulnerable NR modem component. This could potentially be achieved through malicious base stations, compromised network infrastructure, or other attack vectors that allow injection of crafted modem signaling data.
Since no verified code examples are available for this vulnerability, technical exploitation details should be obtained from the Unisoc Security Advisory.
Detection Methods for CVE-2025-61613
Indicators of Compromise
- Unexpected device reboots or crashes without apparent cause
- Modem-related error logs indicating abnormal termination or unhandled exceptions
- Repeated system crashes when connected to specific cellular networks
- Crash dump files indicating NR modem component failures
Detection Strategies
- Monitor system logs for NR modem crash events or abnormal termination patterns
- Implement network traffic analysis to identify malformed signaling data targeting modem components
- Deploy endpoint detection solutions capable of identifying unusual modem behavior
- Enable crash reporting and analysis to identify patterns consistent with exploitation attempts
Monitoring Recommendations
- Configure centralized logging for Android devices in enterprise environments to capture modem-related events
- Implement alerting for devices experiencing repeated unexpected reboots
- Monitor for firmware integrity issues on affected Unisoc chipset devices
- Utilize SentinelOne Singularity Mobile to detect anomalous device behavior indicative of exploitation
How to Mitigate CVE-2025-61613
Immediate Actions Required
- Review the Unisoc Security Advisory for vendor-specific guidance
- Identify all devices in your environment using affected Unisoc chipsets (T8100, T8200, T8300, T9100)
- Prioritize patch deployment for devices running Google Android 13.0 through 16.0 with affected chipsets
- Consider temporary isolation of critical devices until patches are available and deployed
Patch Information
Unisoc has released security information regarding this vulnerability. Organizations should consult the Unisoc Security Advisory for detailed patch availability and deployment instructions. Android security patches addressing this vulnerability should be obtained through the device manufacturer's update channels.
Ensure firmware updates for Unisoc chipsets are applied in conjunction with Android OS patches to fully remediate this vulnerability.
Workarounds
- Limit exposure of affected devices to untrusted networks where possible
- Deploy mobile device management (MDM) solutions to enforce security policies and expedite patch deployment
- Consider network-level controls to filter potentially malicious signaling traffic
- Monitor affected devices for signs of exploitation while awaiting vendor patches
Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.


