CVE-2025-31717

7.5 HIGH

📋 TL;DR

This vulnerability in modem firmware allows remote attackers to cause a system crash through improper input validation, leading to denial of service. It affects systems using Unisoc modem chipsets and requires no authentication or special privileges to exploit.

💻 Affected Systems

Products:
  • Unisoc modem chipsets
Versions: Specific versions not disclosed in public advisory
Operating Systems: Android, Linux-based embedded systems
Default Config Vulnerable: ⚠️ Yes
Notes: Affects devices with Unisoc modem chips; exact models not specified in public advisory

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Permanent modem failure requiring hardware replacement or complete system reboot, disrupting all cellular connectivity.

🟠

Likely Case

Temporary modem crash requiring system reboot to restore cellular connectivity.

🟢

If Mitigated

Limited impact with proper network segmentation and input validation at higher layers.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Remote exploitation possible without authentication; specific exploit details not publicly available

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified in public advisory

Vendor Advisory: https://www.unisoc.com/en/support/announcement/1976557615080263681

Restart Required: Yes

Instructions:

1. Contact device manufacturer for firmware updates. 2. Apply modem firmware patch. 3. Reboot device to activate new firmware.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate modem interfaces from untrusted networks

Input Filtering

linux

Implement packet filtering for modem communication

iptables -A INPUT -p tcp --dport [modem_port] -j DROP
iptables -A INPUT -p udp --dport [modem_port] -j DROP

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate modem interfaces
  • Deploy intrusion detection systems to monitor for modem crash attempts

🔍 How to Verify

Check if Vulnerable:

Check modem firmware version against manufacturer's advisory; contact device vendor for specific vulnerability assessment

Check Version:

adb shell getprop | grep modem (for Android devices) or manufacturer-specific modem query commands

Verify Fix Applied:

Verify modem firmware has been updated to patched version; test modem stability with various inputs

📡 Detection & Monitoring

Log Indicators:

  • Modem crash logs
  • Unexpected modem resets
  • Cellular connectivity loss events

Network Indicators:

  • Unusual traffic patterns to modem ports
  • Malformed packets targeting modem interfaces

SIEM Query:

source="modem_logs" AND (event="crash" OR event="reset" OR event="failure")

🔗 References

📤 Share & Export