PatchSiren

Unisoc CVE debriefs

These pages are published after PatchSiren validates generated defensive summaries against stored public CVE and source evidence.

HIGH Unisoc CVE published 2026-05-06

CVE-2025-71255

CVE-2025-71255 is a remotely reachable denial-of-service issue tied to improper input validation in Modem IMS. NVD rates it HIGH with a 7.5 CVSS score, and the published details indicate no additional execution privileges are needed. The available source corpus points to affected Android 13 through Android 16 environments and cites a Unisoc vendor advisory.

HIGH Unisoc CVE published 2026-05-06

CVE-2025-71254

CVE-2025-71254 is a high-severity availability issue in Modem IMS. According to the official summary, improper input validation could let a remote attacker trigger denial of service without needing additional execution privileges. NVD published the record on 2026-05-06 and updated it on 2026-05-11.

HIGH Unisoc CVE published 2026-05-06

CVE-2025-71253

CVE-2025-71253 is a High-severity denial-of-service issue reported in Unisoc Modem IMS. According to the CVE description, improper input validation could let a remote attacker disrupt service without needing execution privileges. NVD rates the issue 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H), which points to a network-reachable availability impact rather than data theft or code execution. NVD also links to [truncated]

HIGH Unisoc CVE published 2026-05-06

CVE-2025-71252

CVE-2025-71252 is a high-severity remote denial-of-service issue in Modem IMS caused by improper input validation. According to NVD, the flaw can be triggered over the network with no additional execution privileges and no user interaction, and the impact is loss of availability rather than code execution or data exposure. NVD references a Unisoc vendor advisory for further product guidance.

HIGH Unisoc CVE published 2026-05-06

CVE-2025-71251

CVE-2025-71251 is a high-severity remote denial-of-service issue. The NVD description says an IMS component can crash because of improper input validation, and that an attacker does not need additional execution privileges to trigger the condition. NVD rates the issue 7.5 (High) with network access, low attack complexity, no privileges required, no user interaction, and availability impact only.