PatchSiren cyber security CVE debrief
CVE-2025-71256 Google CVE debrief
CVE-2025-71256 is a high-severity Android issue in the nr modem path where improper input validation can let a remote attacker crash or disrupt service. NVD rates the issue AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H, which means it is network-reachable, requires no privileges or user interaction, and can significantly impact availability. The NVD record lists affected Android versions 13 through 16 and points to a vendor advisory for mitigation details.
- Vendor
- Product
- CVE-2025-71256
- CVSS
- HIGH 7.5
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2026-05-06
- Original CVE updated
- 2026-05-11
- Advisory published
- 2026-05-06
- Advisory updated
- 2026-05-11
Who should care
Android device owners, mobile OEMs, fleet administrators, carriers, and security teams responsible for devices running Android 13 through 16 or modem firmware derived from affected vendor builds.
Technical summary
The supplied record describes an improper input validation flaw in nr modem that can be triggered remotely and may result in denial of service. NVD classifies the issue as high severity with no confidentiality or integrity impact, but high availability impact. The record also maps the affected products to Android 13, 14, 15, and 16, and references a vendor advisory for additional context and remediation.
Defensive priority
High. This is remotely reachable, needs no authentication, and can affect availability across multiple Android versions.
Recommended defensive actions
- Review the vendor advisory and apply the relevant Android/OEM security update as soon as it is available.
- Inventory devices running Android 13, 14, 15, or 16 and confirm whether the OEM build or modem firmware is in scope.
- Prioritize patching internet-connected, carrier-managed, and enterprise-managed devices first.
- Monitor affected devices for modem instability, crashes, radio resets, or unexpected loss of service.
- Coordinate with the device OEM or carrier if patch timing depends on a firmware rollout rather than a standard OS update.
Evidence notes
This debrief is based on the supplied NVD record for CVE-2025-71256 and the referenced Unisoc vendor advisory URL. The NVD entry marks the vulnerability as analyzed and lists affected Android CPEs for versions 13.0 through 16.0. The CVSS vector provided by NVD is CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H, supporting the remote denial-of-service assessment.
Official resources
-
CVE-2025-71256 CVE record
CVE.org
-
CVE-2025-71256 NVD detail
NVD
-
Source item URL
nvd_modified
-
Mitigation or vendor reference
[email protected] - Vendor Advisory
CVE-2025-71256 was published on 2026-05-06 and last modified on 2026-05-11. The timing context in this debrief uses the supplied CVE publication and modification timestamps.