CVE-2025-71251
Received Received - Intake
System Crash Due to Improper Input Validation in IMS

Publication date: 2026-05-06

Last updated on: 2026-05-06

Assigner: Unisoc

Description
In IMS, there is a possible system crash due to improper input validation. This could lead to remote denial of service with no additional execution privileges needed.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-05-06
Last Modified
2026-05-06
Generated
2026-05-06
AI Q&A
2026-05-06
EPSS Evaluated
N/A
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
unisoc modem_ims From 13 (inc) to 16 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-UNKNOWN
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2025-71251 is a high-severity vulnerability found in the Modem IMS component of certain chipsets such as SC7731E, SC9832E, and SC9863A. The issue arises from improper input validation, which means the system does not correctly check or sanitize incoming data. This flaw allows a remote attacker to cause a system crash, resulting in a denial of service (DoS) without needing any additional execution privileges.

  • The vulnerability affects multiple Android versions, from Android 13 to Android 16.
  • It is classified under CWE-20 (Improper Input Validation).
  • The attack vector is network-based, meaning it can be exploited remotely.

How can this vulnerability impact me? :

This vulnerability can impact you by causing a remote denial of service (DoS) on affected devices. An attacker can exploit the improper input validation flaw to crash the system remotely, making the device unavailable or unresponsive.

  • No additional execution privileges are required for exploitation, increasing the risk.
  • Affected devices running Android versions 13 through 16 on certain chipsets are vulnerable.

What immediate steps should I take to mitigate this vulnerability?

The vulnerability is due to improper input validation in the Modem IMS component, which can be exploited remotely to cause a system crash and denial of service.

Immediate mitigation steps include applying any security patches or updates provided by the vendor for affected chipsets such as SC7731E, SC9832E, SC9863A, and others.

Additionally, restricting network access to the IMS service or isolating affected devices from untrusted networks may reduce the risk of exploitation.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The provided information does not specify any direct impact of this vulnerability on compliance with common standards and regulations such as GDPR or HIPAA.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart