Impact
The vulnerability is located in the Modem IMS component of Unisoc devices. An attacker may supply specially crafted input that bypasses validation checks, causing the modem to crash or become unreachable. This results in a denial of service to all services that rely on the modem. No escalation of privileges is required.
Affected Systems
Unisoc (Shanghai) Technologies Co., Ltd. products: SC7731E, SC9832E, SC9863A, T310, T610, T618, T7200, T7225, T7250, T7255, T7280, T7300, T8100, T9100, T8200, and T8300. Affected versions are not disclosed by the vendor.
Risk and Exploitability
The CVSS score of 7.5 indicates high severity. No EPSS score is currently published, so the exploitation probability cannot be quantified. The vulnerability is not listed in CISA's KEV catalog, suggesting that there are no publicly known exploits. Attackers would need remote network access to the modem’s IMS interface, which may be over IP or a proprietary protocol. While privilege escalation is not required, the impact is a loss of service. In the absence of patch availability, the attack vector is likely remote network. The lack of exploitation evidence tolerates a measured risk but warrants monitoring.
OpenCVE Enrichment