The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2025-61613

CVE-2025-61613: Google Android NR Modem DoS Vulnerability

CVE-2025-61613 is a denial of service vulnerability in Google Android's NR modem component that can cause system crashes through improper input validation. This article covers technical details, affected versions, and mitigations.

Updated: May 15, 2026

CVE-2025-61613 Overview

CVE-2025-61613 is an improper input validation vulnerability [CWE-20] in the Unisoc 5G New Radio (NR) modem firmware. The flaw allows a remote attacker to trigger a system crash through malformed input processed by the modem stack. Exploitation requires no authentication, no user interaction, and can be performed over the network.

The vulnerability affects multiple Unisoc chipsets including the T8100, T8200, T8300, and T9100, which are integrated into Android devices running versions 13 through 16. Successful exploitation results in a denial-of-service condition affecting cellular connectivity on the targeted device.

Critical Impact

Remote attackers can crash the modem subsystem on affected Android devices without any privileges or user interaction, disrupting cellular communications.

Affected Products

  • Google Android versions 13.0, 14.0, 15.0, and 16.0
  • Unisoc T8100 and T8200 chipsets
  • Unisoc T8300 and T9100 chipsets

Discovery Timeline

  • 2026-03-09 - CVE-2025-61613 published to the National Vulnerability Database
  • 2026-03-09 - Last updated in NVD database

Technical Details for CVE-2025-61613

Vulnerability Analysis

The vulnerability resides in the NR (5G New Radio) modem firmware shipped with several Unisoc system-on-chip platforms. The modem fails to properly validate input before processing, leading to a crash of the modem subsystem. Because the modem handles cellular protocol messages received over the air, a network-positioned attacker can deliver crafted radio frames to trigger the fault.

The issue is classified as Improper Input Validation [CWE-20]. The modem accepts data that falls outside of expected ranges or formats, then operates on it without adequate sanity checks. This produces an unrecoverable fault that takes the modem offline until the device or baseband is reset.

The impact is limited to availability. The advisory states that no additional execution privileges are gained and confidentiality and integrity are not affected. Exploitation produces a denial-of-service condition against cellular services.

Root Cause

The root cause is missing or incomplete validation of fields in messages handled by the NR modem stack. Inputs that should be rejected as malformed are instead passed into processing routines, where they trigger a fatal error. The Unisoc advisory does not identify the specific protocol layer or field involved.

Attack Vector

An attacker within radio range, or operating a rogue base station, can transmit crafted 5G NR signaling to a target device. Because the attack vector is network-based with low complexity and no authentication required, mass disruption of devices in a cell coverage area is feasible. See the Unisoc Support Announcement for vendor details.

No public proof-of-concept exploit code is available for CVE-2025-61613 at the time of publication.

Detection Methods for CVE-2025-61613

Indicators of Compromise

  • Unexplained modem resets, baseband crashes, or loss of cellular connectivity on affected Unisoc-based Android devices
  • Repeated RIL (Radio Interface Layer) errors or modem restart events in device logs
  • Clusters of devices in the same geographic area losing cellular service simultaneously, which may indicate a rogue base station

Detection Strategies

  • Monitor mobile device management (MDM) telemetry for cellular connectivity drops correlated across devices using Unisoc T8100, T8200, T8300, or T9100 chipsets
  • Inspect Android logcat and bug reports for repeated modem subsystem restart entries, which can indicate exploitation attempts
  • Correlate cellular outage events with physical location data to identify potential rogue base station activity

Monitoring Recommendations

  • Track Android security bulletin updates and Unisoc advisories for patch availability on affected firmware
  • Build dashboards that aggregate device crash reports filtered by chipset model and Android version
  • Establish alerts for anomalous concentrations of modem failures within fleet-managed device groups

How to Mitigate CVE-2025-61613

Immediate Actions Required

  • Inventory devices that use Unisoc T8100, T8200, T8300, or T9100 chipsets and run Android 13 through 16
  • Apply vendor patches as soon as they are delivered through Android security updates or carrier firmware updates
  • Restrict use of affected devices in high-risk environments where rogue base station attacks are plausible until patches are applied

Patch Information

Unisoc has published an advisory acknowledging the vulnerability. Refer to the Unisoc Support Announcement for the official patch status. Device manufacturers and carriers must integrate the corrected modem firmware into their Android security update streams before end users receive the fix.

Workarounds

  • Disable 5G NR and force devices to use LTE-only mode where supported, reducing exposure to the vulnerable NR protocol path
  • Limit device operation to trusted cellular networks and avoid roaming in untrusted regions until firmware is patched
  • Use enterprise mobility management policies to enforce updated firmware baselines on managed Android devices
bash
# Example: query Android device for modem and build information
adb shell getprop | grep -Ei "ro.build.version|ro.boot.hardware|gsm.version.baseband"

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeDOS

  • Vendor/TechGoogle Android

  • SeverityHIGH

  • CVSS Score7.5

  • EPSS Probability0.07%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • NVD-CWE-noinfo

  • CWE-20
  • Vendor Resources
  • Unisoc Support Announcement
  • Related CVEs
  • CVE-2026-0109: Google Android DoS Vulnerability

  • CVE-2025-61616: Google Android DOS Vulnerability

  • CVE-2025-61615: Google Android DOS Vulnerability

  • CVE-2025-61614: Google Android DOS Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the Most Advanced Cybersecurity Platform

See how the world’s most intelligent, autonomous cybersecurity platform can protect your organization today and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English