Skip to main content

CVE-2025-24332: Vulnerability in Nokia Nokia Single RAN AirScale (Flexi Multiradio is not affected)

High
VulnerabilityCVE-2025-24332cvecve-2025-24332
Published: Wed Jul 02 2025 (07/02/2025, 08:31:38 UTC)
Source: CVE Database V5
Vendor/Project: Nokia
Product: Nokia Single RAN AirScale (Flexi Multiradio is not affected)

Description

Nokia Single RAN AirScale baseband allows an authenticated administrative user access to all physical boards after performing a single login to the baseband system board. The baseband does not re-authenticate the user when they connect from the baseband system board to the baseband capacity boards using the internal bsoc SSH service, which is available only internally within the baseband and through the internal backplane between the boards. The bsoc SSH allows login from one board to another via the baseband internal backplane using an SSH private key present on the baseband system board. This bsoc SSH capability was previously considered an administrative functionality but has now been restricted to be available only to baseband root-privileged administrators. This restriction mitigates the possibility of misuse with lower-level privileges (e.g., from baseband software images). This mitigation is included starting from release 23R4-SR 3.0 MP and later

AI-Powered Analysis

AILast updated: 07/02/2025, 08:55:13 UTC

Technical Analysis

CVE-2025-24332 is a vulnerability identified in Nokia's Single RAN AirScale baseband system, affecting all releases prior to version 23R4-SR 3.0 MP. The issue arises from the way the baseband system board manages authentication when accessing other physical boards within the baseband, specifically the baseband capacity boards. After an authenticated administrative user logs into the baseband system board, the system does not require re-authentication when the user connects to other boards via the internal bsoc SSH service. This SSH service uses a private key stored on the baseband system board to facilitate passwordless SSH logins across the internal backplane connecting the boards. Originally, this functionality was intended as an administrative convenience, but it inadvertently allows any authenticated administrative user to gain unrestricted access to all physical boards without additional authentication checks. This lack of re-authentication could be exploited by attackers who have obtained administrative credentials or access to the system board, enabling lateral movement within the baseband hardware and potentially full control over the baseband's components. Nokia has mitigated this vulnerability starting with release 23R4-SR 3.0 MP by restricting the bsoc SSH capability exclusively to root-privileged administrators, thereby preventing lower-privileged users or compromised software images from abusing this access. The Flexi Multiradio product line is not affected by this vulnerability. No known exploits are reported in the wild as of the publication date, and no CVSS score has been assigned yet.

Potential Impact

For European organizations, especially telecommunications providers and infrastructure operators using Nokia Single RAN AirScale baseband systems, this vulnerability presents a significant risk. Exploitation could allow an attacker with administrative access to escalate privileges and move laterally across the baseband hardware, potentially leading to full compromise of the radio access network components. This could result in service disruption, interception or manipulation of network traffic, and unauthorized control over critical network infrastructure. Given the central role of baseband units in mobile networks, such a compromise could impact the confidentiality, integrity, and availability of mobile communications services. This is particularly critical in Europe where mobile networks support essential services, including emergency communications and critical infrastructure connectivity. The absence of re-authentication increases the risk that a single compromised administrative credential could lead to full system compromise. Although no exploits are currently known, the vulnerability's nature makes it a high-value target for attackers aiming to disrupt or surveil telecommunications infrastructure.

Mitigation Recommendations

European organizations operating Nokia Single RAN AirScale baseband systems should urgently verify their software versions and upgrade to release 23R4-SR 3.0 MP or later, where the vulnerability is mitigated by restricting bsoc SSH access to root-privileged administrators only. Additionally, organizations should enforce strict access controls and monitoring on administrative accounts to prevent credential compromise. Implement network segmentation to isolate baseband system boards from less trusted internal networks and restrict access to the internal backplane where feasible. Employ multi-factor authentication for administrative access to the baseband system board to reduce the risk of credential misuse. Regularly audit and monitor SSH key usage and internal SSH connections within the baseband to detect anomalous activity. Finally, maintain close coordination with Nokia for any further patches or security advisories related to this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Nokia
Date Reserved
2025-01-20T05:33:25.524Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6864f0416f40f0eb729218af

Added to database: 7/2/2025, 8:39:29 AM

Last enriched: 7/2/2025, 8:55:13 AM

Last updated: 7/12/2025, 5:34:13 PM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats