Description
In Modem IMS, there is a possible improper input validation. This could lead to remote denial of service with no additional execution privileges needed.
Published: 2026-05-06
Score: 7.5 High
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability resides in the Modem IMS component of Unisoc's SC series processors. It arises from improper input validation that can be triggered by crafted packets. An attacker does not need elevated privileges; successfully exploiting the flaw can cause the modem to crash or reset, leading to a loss of network connectivity. The flaw results in a denial of service without affecting confidentiality or integrity, but it can disrupt communications for any user relying on the affected device.

Affected Systems

Affected vendors and products include Unisoc (Shanghai) Technologies Co., Ltd., specifically the SC7731E, SC9832E, SC9863A, T310, T610, T618, T7200, T7225, T7250, T7255, T7280, T7300, T8100, T9100, T8200, and T8300. The vulnerability impacts the Modem IMS module within these chipsets or devices that incorporate them. The current data does not list a specific patched version, so users should consult the vendor for firmware updates.

Risk and Exploitability

With a CVSS score of 7.5, the flaw is considered high severity. The EPSS is unavailable, so the likelihood of exploitation cannot be quantified from EPSS data. The vulnerability is not listed in the CISA KEV catalog, suggesting there may be no known public exploitation campaigns. However, because the attacker can trigger the denial of service remotely by sending malformed traffic to the Modem IMS interface, the attack vector is likely network-based. The absence of privilege escalation means the threat is limited to service interruption, but it can severely affect availability for users of the affected devices.

Generated by OpenCVE AI on May 6, 2026 at 03:22 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Download and install the latest firmware or microcode update from Unisoc that addresses the Modem IMS input validation issue.
  • Configure network security controls to detect and filter malformed IMS packets, such as packet inspection and rate limiting on the modem interfaces.
  • Monitor device logs and performance metrics for signs of repeated resets or crashes, and temporarily isolate the device if repeated DoS conditions occur to prevent network disruption.

Generated by OpenCVE AI on May 6, 2026 at 03:22 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 06 May 2026 02:00:00 +0000

Type Values Removed Values Added
Description In Modem IMS, there is a possible improper input validation. This could lead to remote denial of service with no additional execution privileges needed.
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: Unisoc

Published:

Updated: 2026-05-06T01:43:07.518Z

Reserved: 2026-03-02T05:55:13.665Z

Link: CVE-2025-71252

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-06T02:16:04.733

Modified: 2026-05-06T02:16:04.733

Link: CVE-2025-71252

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-06T03:30:05Z

Weaknesses

No weakness.