Skip to main content

CVE-2025-22940: n/a

Critical
VulnerabilityCVE-2025-22940cvecve-2025-22940
Published: Mon Mar 31 2025 (03/31/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

Incorrect access control in Adtran 411 ONT L80.00.0011.M2 allows unauthorized attackers to arbitrarily set the admin password.

AI-Powered Analysis

AILast updated: 08/18/2025, 17:02:57 UTC

Technical Analysis

CVE-2025-22940 is a critical security vulnerability affecting the Adtran 411 Optical Network Terminal (ONT) with firmware version L80.00.0011.M2. The vulnerability arises from incorrect access control mechanisms within the device's management interface, which allows an unauthenticated attacker to arbitrarily set the administrator password. This flaw effectively bypasses authentication controls (CWE-284: Improper Access Control), enabling attackers to gain full administrative privileges without any prior credentials or user interaction. The vulnerability has a CVSS v3.1 base score of 9.1, reflecting its high severity and ease of exploitation over the network (AV:N), with no privileges required (PR:N) and no user interaction needed (UI:N). Successful exploitation compromises the confidentiality and integrity of the device's configuration by allowing attackers to change the admin password, potentially leading to persistent unauthorized access, configuration manipulation, and further lateral attacks within the network. Although no known exploits have been reported in the wild yet, the vulnerability's nature and severity make it a significant risk for organizations deploying the affected Adtran ONT devices, especially in environments where these devices serve as critical network access points.

Potential Impact

For European organizations, the impact of this vulnerability can be substantial, particularly for Internet Service Providers (ISPs), telecommunications companies, and enterprises relying on Adtran 411 ONT devices for broadband access or network edge connectivity. Unauthorized administrative access can lead to interception or manipulation of network traffic, disruption of services, and potential compromise of downstream systems connected through these ONTs. Confidential customer data and internal communications could be exposed or altered, undermining data privacy and regulatory compliance such as GDPR. Additionally, attackers could leverage compromised ONTs as footholds for broader network intrusion campaigns or to launch denial-of-service attacks against critical infrastructure. The lack of authentication requirements and the ability to exploit remotely increase the risk of widespread exploitation if the vulnerability is weaponized. This threat is particularly concerning for sectors with high availability and confidentiality requirements, including finance, healthcare, and government agencies within Europe.

Mitigation Recommendations

Immediate mitigation steps include isolating affected Adtran 411 ONT devices from untrusted networks to limit exposure. Network segmentation should be enforced to restrict management interface access to trusted administrative hosts only. Organizations should monitor network traffic for unusual access attempts targeting ONT management interfaces. Since no official patches are currently available, applying vendor-recommended firmware updates as soon as they are released is critical. In the interim, consider implementing compensating controls such as deploying firewall rules to block external access to ONT management ports, enforcing strong network access controls, and using VPNs or secure management channels for administrative access. Regularly audit device configurations and access logs to detect unauthorized changes. Additionally, organizations should engage with Adtran support channels to obtain guidance and updates on patch availability and vulnerability remediation timelines.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-01-09T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68a3592dad5a09ad00b0a8c7

Added to database: 8/18/2025, 4:47:41 PM

Last enriched: 8/18/2025, 5:02:57 PM

Last updated: 8/18/2025, 5:58:21 PM

Views: 3

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats