Skip to main content

CVE-2025-22937: n/a

Critical
VulnerabilityCVE-2025-22937cvecve-2025-22937
Published: Mon Mar 31 2025 (03/31/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

An issue in Adtran 411 ONT vL80.00.0011.M2 allows attackers to escalate privileges via unspecified vectors.

AI-Powered Analysis

AILast updated: 08/18/2025, 17:03:34 UTC

Technical Analysis

CVE-2025-22937 is a critical security vulnerability identified in the Adtran 411 Optical Network Terminal (ONT) running firmware version vL80.00.0011.M2. This vulnerability allows attackers to escalate privileges through unspecified attack vectors, meaning that an attacker can gain higher-level access rights than initially permitted. The vulnerability is classified under CWE-269, which relates to improper privilege management, indicating that the system fails to enforce correct access controls. The CVSS v3.1 base score of 9.8 reflects the severity of this issue, highlighting that the attack vector is network-based (AV:N), requires no authentication (PR:N), and no user interaction (UI:N), making it highly exploitable remotely. The impact covers confidentiality, integrity, and availability (C:H/I:H/A:H), meaning an attacker could fully compromise the device, potentially intercepting or manipulating data, disrupting service, or gaining control over network functions. Although specific affected versions beyond the given firmware are not detailed, the absence of patch links suggests that a fix may not yet be publicly available. The vulnerability's exploitation could allow attackers to pivot within a network, especially in environments where Adtran ONTs are deployed as customer premises equipment or part of service provider infrastructure, potentially leading to widespread network compromise or service disruption.

Potential Impact

For European organizations, the impact of CVE-2025-22937 is significant due to the widespread use of Adtran ONTs in telecommunications infrastructure, particularly among ISPs and enterprises relying on fiber optic broadband connections. Successful exploitation could lead to unauthorized access to network devices, enabling attackers to intercept sensitive communications, disrupt internet connectivity, or launch further attacks within corporate or service provider networks. This could affect confidentiality of customer data, integrity of transmitted information, and availability of critical network services. Given the critical nature of telecommunications infrastructure in Europe, including for government, finance, healthcare, and industrial sectors, this vulnerability poses a substantial risk to operational continuity and data protection compliance under regulations such as GDPR. Additionally, the lack of required authentication and user interaction increases the likelihood of automated exploitation attempts, raising the urgency for European organizations to assess their exposure and implement mitigations promptly.

Mitigation Recommendations

1. Immediate Network Segmentation: Isolate Adtran 411 ONTs from critical internal networks to limit potential lateral movement in case of compromise. 2. Access Control Enforcement: Implement strict access controls on management interfaces of ONTs, restricting access to trusted IP addresses and using VPNs or secure tunnels where possible. 3. Monitoring and Logging: Enhance network monitoring to detect unusual traffic patterns or unauthorized access attempts targeting ONTs. Deploy intrusion detection/prevention systems (IDS/IPS) tuned for Adtran device signatures. 4. Firmware Verification and Updates: Engage with Adtran or authorized vendors to obtain information on patches or firmware updates addressing this vulnerability. Until patches are available, consider temporary device replacement or disabling vulnerable features if feasible. 5. Incident Response Preparedness: Develop and test incident response plans specific to network device compromise, including rapid isolation and recovery procedures. 6. Vendor Communication: Maintain active communication channels with Adtran for timely updates and advisories. 7. Network Device Inventory: Maintain an accurate inventory of all Adtran ONTs deployed to prioritize remediation efforts and ensure no devices are overlooked.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-01-09T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68a3592dad5a09ad00b0a8ba

Added to database: 8/18/2025, 4:47:41 PM

Last enriched: 8/18/2025, 5:03:34 PM

Last updated: 8/19/2025, 12:34:27 AM

Views: 4

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats