CVE-2025-22940: n/a
Incorrect access control in Adtran 411 ONT L80.00.0011.M2 allows unauthorized attackers to arbitrarily set the admin password.
AI Analysis
Technical Summary
CVE-2025-22940 is a critical security vulnerability affecting the Adtran 411 Optical Network Terminal (ONT) with firmware version L80.00.0011.M2. The vulnerability arises from incorrect access control mechanisms within the device's management interface, which allows an unauthenticated attacker to arbitrarily set the administrator password. This flaw effectively bypasses authentication controls (CWE-284: Improper Access Control), enabling attackers to gain full administrative privileges without any prior credentials or user interaction. The vulnerability has a CVSS v3.1 base score of 9.1, reflecting its high severity and ease of exploitation over the network (AV:N), with no privileges required (PR:N) and no user interaction needed (UI:N). Successful exploitation compromises the confidentiality and integrity of the device's configuration by allowing attackers to change the admin password, potentially leading to persistent unauthorized access, configuration manipulation, and further lateral attacks within the network. Although no known exploits have been reported in the wild yet, the vulnerability's nature and severity make it a significant risk for organizations deploying the affected Adtran ONT devices, especially in environments where these devices serve as critical network access points.
Potential Impact
For European organizations, the impact of this vulnerability can be substantial, particularly for Internet Service Providers (ISPs), telecommunications companies, and enterprises relying on Adtran 411 ONT devices for broadband access or network edge connectivity. Unauthorized administrative access can lead to interception or manipulation of network traffic, disruption of services, and potential compromise of downstream systems connected through these ONTs. Confidential customer data and internal communications could be exposed or altered, undermining data privacy and regulatory compliance such as GDPR. Additionally, attackers could leverage compromised ONTs as footholds for broader network intrusion campaigns or to launch denial-of-service attacks against critical infrastructure. The lack of authentication requirements and the ability to exploit remotely increase the risk of widespread exploitation if the vulnerability is weaponized. This threat is particularly concerning for sectors with high availability and confidentiality requirements, including finance, healthcare, and government agencies within Europe.
Mitigation Recommendations
Immediate mitigation steps include isolating affected Adtran 411 ONT devices from untrusted networks to limit exposure. Network segmentation should be enforced to restrict management interface access to trusted administrative hosts only. Organizations should monitor network traffic for unusual access attempts targeting ONT management interfaces. Since no official patches are currently available, applying vendor-recommended firmware updates as soon as they are released is critical. In the interim, consider implementing compensating controls such as deploying firewall rules to block external access to ONT management ports, enforcing strong network access controls, and using VPNs or secure management channels for administrative access. Regularly audit device configurations and access logs to detect unauthorized changes. Additionally, organizations should engage with Adtran support channels to obtain guidance and updates on patch availability and vulnerability remediation timelines.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Poland, Sweden, Finland
CVE-2025-22940: n/a
Description
Incorrect access control in Adtran 411 ONT L80.00.0011.M2 allows unauthorized attackers to arbitrarily set the admin password.
AI-Powered Analysis
Technical Analysis
CVE-2025-22940 is a critical security vulnerability affecting the Adtran 411 Optical Network Terminal (ONT) with firmware version L80.00.0011.M2. The vulnerability arises from incorrect access control mechanisms within the device's management interface, which allows an unauthenticated attacker to arbitrarily set the administrator password. This flaw effectively bypasses authentication controls (CWE-284: Improper Access Control), enabling attackers to gain full administrative privileges without any prior credentials or user interaction. The vulnerability has a CVSS v3.1 base score of 9.1, reflecting its high severity and ease of exploitation over the network (AV:N), with no privileges required (PR:N) and no user interaction needed (UI:N). Successful exploitation compromises the confidentiality and integrity of the device's configuration by allowing attackers to change the admin password, potentially leading to persistent unauthorized access, configuration manipulation, and further lateral attacks within the network. Although no known exploits have been reported in the wild yet, the vulnerability's nature and severity make it a significant risk for organizations deploying the affected Adtran ONT devices, especially in environments where these devices serve as critical network access points.
Potential Impact
For European organizations, the impact of this vulnerability can be substantial, particularly for Internet Service Providers (ISPs), telecommunications companies, and enterprises relying on Adtran 411 ONT devices for broadband access or network edge connectivity. Unauthorized administrative access can lead to interception or manipulation of network traffic, disruption of services, and potential compromise of downstream systems connected through these ONTs. Confidential customer data and internal communications could be exposed or altered, undermining data privacy and regulatory compliance such as GDPR. Additionally, attackers could leverage compromised ONTs as footholds for broader network intrusion campaigns or to launch denial-of-service attacks against critical infrastructure. The lack of authentication requirements and the ability to exploit remotely increase the risk of widespread exploitation if the vulnerability is weaponized. This threat is particularly concerning for sectors with high availability and confidentiality requirements, including finance, healthcare, and government agencies within Europe.
Mitigation Recommendations
Immediate mitigation steps include isolating affected Adtran 411 ONT devices from untrusted networks to limit exposure. Network segmentation should be enforced to restrict management interface access to trusted administrative hosts only. Organizations should monitor network traffic for unusual access attempts targeting ONT management interfaces. Since no official patches are currently available, applying vendor-recommended firmware updates as soon as they are released is critical. In the interim, consider implementing compensating controls such as deploying firewall rules to block external access to ONT management ports, enforcing strong network access controls, and using VPNs or secure management channels for administrative access. Regularly audit device configurations and access logs to detect unauthorized changes. Additionally, organizations should engage with Adtran support channels to obtain guidance and updates on patch availability and vulnerability remediation timelines.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2025-01-09T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68a3592dad5a09ad00b0a8c7
Added to database: 8/18/2025, 4:47:41 PM
Last enriched: 8/18/2025, 5:02:57 PM
Last updated: 1/7/2026, 4:17:43 AM
Views: 106
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-20893: Origin validation error in Fujitsu Client Computing Limited Fujitsu Security Solution AuthConductor Client Basic V2
HighCVE-2025-14891: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ivole Customer Reviews for WooCommerce
MediumCVE-2025-14059: CWE-73 External Control of File Name or Path in roxnor EmailKit – Email Customizer for WooCommerce & WP
MediumCVE-2025-12648: CWE-552 Files or Directories Accessible to External Parties in cbutlerjr WP-Members Membership Plugin
MediumCVE-2025-14631: CWE-476 NULL Pointer Dereference in TP-Link Systems Inc. Archer BE400
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.