Impact
The vulnerability arises from improper input validation in the Modem IMS component of certain Unisoc SoCs. An attacker sending specially crafted data can trigger conditions that cause the Modem IMS to crash or become unresponsive, leading to a denial of service. This flaw does not provide a pathway to execute arbitrary code or elevate privileges; its primary consequence is the interruption or degradation of network service for the affected device.
Affected Systems
The defect affects a range of Unisoc (Shanghai) Technologies SoCs, including SC7731E, SC9832E, SC9863A, and several T‑series modules such as T310, T610, T618, T7200, T7225, T7250, T7255, T7280, T7300, T8100, T9100, T8200, and T8300. All devices that run a Modem IMS stack on these processors are potentially vulnerable.
Risk and Exploitability
With a CVSS score of 7.5, the flaw presents a medium to high risk. The EPSS is not available, and it is not listed in the CISA KEV catalog, suggesting no confirmed exploitation yet. The attack vector is remote, originating from the network interface that feeds the Modem IMS, and requires no special privileges on the host.
OpenCVE Enrichment