CVE-2025-61616

7.5 HIGH

📋 TL;DR

This vulnerability in nr modem software allows remote attackers to cause a system crash through improper input validation, leading to denial of service. The attack requires no special privileges and affects systems using vulnerable nr modem implementations. This impacts telecommunications infrastructure and devices relying on this modem technology.

💻 Affected Systems

Products:
  • Unisoc nr modem implementations
Versions: Specific versions not detailed in reference; consult vendor advisory
Operating Systems: Embedded systems using affected modem firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Affects systems with nr modem functionality enabled; exact product models not specified in available information

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system crash leading to extended service disruption, potentially affecting multiple connected devices or network segments.

🟠

Likely Case

Temporary denial of service affecting individual devices or localized network segments until system restart.

🟢

If Mitigated

Limited impact with proper network segmentation and monitoring, allowing quick detection and recovery.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Remote exploitation without authentication suggests relatively straightforward attack vectors

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Consult vendor advisory for specific patched versions

Vendor Advisory: https://www.unisoc.com/en/support/announcement/2030931350138310657

Restart Required: Yes

Instructions:

1. Review vendor advisory for affected products
2. Obtain firmware update from vendor
3. Apply firmware update following vendor instructions
4. Restart affected systems

🔧 Temporary Workarounds

Network segmentation

all

Isolate vulnerable modem systems from untrusted networks

Input validation at network perimeter

all

Implement additional input validation at network boundaries

🧯 If You Can't Patch

  • Implement strict network access controls to limit exposure to trusted sources only
  • Monitor for abnormal modem behavior and system crashes with automated alerting

🔍 How to Verify

Check if Vulnerable:

Check modem firmware version against vendor advisory; monitor for unexplained system crashes

Check Version:

Vendor-specific command; consult device documentation

Verify Fix Applied:

Verify firmware version matches patched version from vendor advisory; test system stability

📡 Detection & Monitoring

Log Indicators:

  • Unexpected system crashes
  • Modem error messages
  • Kernel panic logs

Network Indicators:

  • Unusual traffic patterns to modem interfaces
  • Connection attempts to modem ports

SIEM Query:

Search for 'crash', 'panic', or 'modem error' in system logs within short timeframes

🔗 References

📤 Share & Export