CVE-2025-41760: CWE-636 Not Failing Securely ('Failing Open') in MBS UBR-01 Mk II
An administrator may attempt to block all traffic by configuring a pass filter with an empty table. However, in UBR, an empty list does not enforce any restrictions and allows all network traffic to pass unfiltered.
AI Analysis
Technical Summary
CVE-2025-41760 identifies a security vulnerability classified under CWE-636 (Not Failing Securely) in the MBS UBR-01 Mk II network device. The vulnerability arises from the device's handling of pass filter configurations: when an administrator attempts to block all traffic by setting an empty pass filter table, the device does not enforce any restrictions. Instead, it defaults to allowing all network traffic to pass unfiltered, effectively 'failing open.' This behavior undermines the intended security posture by negating the administrator's configuration to block traffic, potentially exposing the network to unauthorized access or data leakage. The vulnerability requires administrative privileges to configure the pass filter, meaning an attacker must already have elevated access to exploit it. The CVSS v3.1 base score is 4.9 (medium severity), reflecting the high impact on confidentiality but no impact on integrity or availability, with low attack complexity and no user interaction needed. No patches or known exploits currently exist, and the vulnerability was published in March 2026. This issue highlights a critical design flaw in the device's filtering logic, where an empty filter list is interpreted as 'allow all' rather than 'deny all,' violating the principle of secure failure. Organizations using the UBR-01 Mk II must be cautious when configuring pass filters and monitor for updates from MBS to address this flaw.
Potential Impact
The primary impact of CVE-2025-41760 is the potential exposure of sensitive network traffic due to the device allowing all traffic when an empty pass filter is configured. This compromises confidentiality by permitting unauthorized data flows that should have been blocked. While integrity and availability are not directly affected, the lack of enforced filtering can facilitate reconnaissance, data exfiltration, or lateral movement by attackers who have gained administrative access. The vulnerability undermines trust in the device's security controls, potentially leading to compliance violations and increased risk of data breaches. Organizations relying on the UBR-01 Mk II for perimeter or internal network filtering may find their security posture weakened, especially in environments requiring strict traffic segmentation. The requirement for administrative privileges to exploit limits the attack surface but does not eliminate risk, particularly if credential compromise or insider threats exist. The absence of patches means the vulnerability may persist until addressed by the vendor, necessitating interim mitigations. Overall, the vulnerability can lead to significant confidentiality breaches and operational risks for organizations worldwide using this device.
Mitigation Recommendations
To mitigate CVE-2025-41760, organizations should avoid configuring empty pass filter tables on the MBS UBR-01 Mk II device, as this results in unfiltered traffic passage. Instead, explicitly define pass filters with specific allowed traffic rules to ensure proper enforcement. Implement strict access controls and monitoring on administrative interfaces to prevent unauthorized configuration changes. Employ network segmentation and additional filtering layers, such as external firewalls or intrusion prevention systems, to compensate for the device's filtering shortcomings. Regularly audit device configurations to detect any empty or misconfigured pass filters. Engage with MBS support channels to obtain updates on patches or firmware releases addressing this vulnerability and apply them promptly once available. Consider deploying network traffic monitoring solutions to detect anomalous flows that may indicate exploitation attempts. Finally, incorporate this vulnerability into risk assessments and incident response plans to prepare for potential exploitation scenarios.
Affected Countries
United States, Germany, United Kingdom, France, Japan, South Korea, Australia, Canada, Netherlands, Singapore
CVE-2025-41760: CWE-636 Not Failing Securely ('Failing Open') in MBS UBR-01 Mk II
Description
An administrator may attempt to block all traffic by configuring a pass filter with an empty table. However, in UBR, an empty list does not enforce any restrictions and allows all network traffic to pass unfiltered.
AI-Powered Analysis
Technical Analysis
CVE-2025-41760 identifies a security vulnerability classified under CWE-636 (Not Failing Securely) in the MBS UBR-01 Mk II network device. The vulnerability arises from the device's handling of pass filter configurations: when an administrator attempts to block all traffic by setting an empty pass filter table, the device does not enforce any restrictions. Instead, it defaults to allowing all network traffic to pass unfiltered, effectively 'failing open.' This behavior undermines the intended security posture by negating the administrator's configuration to block traffic, potentially exposing the network to unauthorized access or data leakage. The vulnerability requires administrative privileges to configure the pass filter, meaning an attacker must already have elevated access to exploit it. The CVSS v3.1 base score is 4.9 (medium severity), reflecting the high impact on confidentiality but no impact on integrity or availability, with low attack complexity and no user interaction needed. No patches or known exploits currently exist, and the vulnerability was published in March 2026. This issue highlights a critical design flaw in the device's filtering logic, where an empty filter list is interpreted as 'allow all' rather than 'deny all,' violating the principle of secure failure. Organizations using the UBR-01 Mk II must be cautious when configuring pass filters and monitor for updates from MBS to address this flaw.
Potential Impact
The primary impact of CVE-2025-41760 is the potential exposure of sensitive network traffic due to the device allowing all traffic when an empty pass filter is configured. This compromises confidentiality by permitting unauthorized data flows that should have been blocked. While integrity and availability are not directly affected, the lack of enforced filtering can facilitate reconnaissance, data exfiltration, or lateral movement by attackers who have gained administrative access. The vulnerability undermines trust in the device's security controls, potentially leading to compliance violations and increased risk of data breaches. Organizations relying on the UBR-01 Mk II for perimeter or internal network filtering may find their security posture weakened, especially in environments requiring strict traffic segmentation. The requirement for administrative privileges to exploit limits the attack surface but does not eliminate risk, particularly if credential compromise or insider threats exist. The absence of patches means the vulnerability may persist until addressed by the vendor, necessitating interim mitigations. Overall, the vulnerability can lead to significant confidentiality breaches and operational risks for organizations worldwide using this device.
Mitigation Recommendations
To mitigate CVE-2025-41760, organizations should avoid configuring empty pass filter tables on the MBS UBR-01 Mk II device, as this results in unfiltered traffic passage. Instead, explicitly define pass filters with specific allowed traffic rules to ensure proper enforcement. Implement strict access controls and monitoring on administrative interfaces to prevent unauthorized configuration changes. Employ network segmentation and additional filtering layers, such as external firewalls or intrusion prevention systems, to compensate for the device's filtering shortcomings. Regularly audit device configurations to detect any empty or misconfigured pass filters. Engage with MBS support channels to obtain updates on patches or firmware releases addressing this vulnerability and apply them promptly once available. Consider deploying network traffic monitoring solutions to detect anomalous flows that may indicate exploitation attempts. Finally, incorporate this vulnerability into risk assessments and incident response plans to prepare for potential exploitation scenarios.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- CERTVDE
- Date Reserved
- 2025-04-16T11:18:45.760Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69ae86d72904315ca3e5dbeb
Added to database: 3/9/2026, 8:37:43 AM
Last enriched: 3/9/2026, 8:54:20 AM
Last updated: 3/13/2026, 5:58:41 PM
Views: 14
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.