CVE-2025-44643: n/a
Certain Draytek products are affected by Insecure Permissions. This affects AP903 v1.4.18 and AP912C v1.4.9 and AP918R v1.4.9. The setting of the secret field in the FreeRadius-related clients.conf configuration file sets a hardcoded weak password, posing a security risk.
AI Analysis
Technical Summary
CVE-2025-44643 identifies a security vulnerability in certain Draytek networking products, specifically the AP903 version 1.4.18, AP912C version 1.4.9, and AP918R version 1.4.9. The vulnerability arises from insecure permissions related to the FreeRadius-related clients.conf configuration file. In this file, a 'secret' field is set with a hardcoded weak password. FreeRadius is a widely used open-source RADIUS server that handles authentication, authorization, and accounting for network access. The presence of a hardcoded weak password in the clients.conf file means that attackers with access to the device or network could potentially authenticate against the RADIUS server using this known secret, bypassing normal authentication controls. This could allow unauthorized users to gain access to network resources or manipulate authentication processes. The vulnerability is rooted in insecure configuration management and poor credential handling practices, which undermine the security of the affected devices. Although no known exploits are currently reported in the wild, the weakness presents a significant risk if attackers gain network access or can interact with the RADIUS service. The lack of a CVSS score indicates that the vulnerability has not yet been fully assessed for severity, but the technical details suggest a critical security flaw due to the potential for unauthorized network access. No patches or mitigations are currently linked, indicating that affected organizations must proactively address this issue through configuration changes or firmware updates once available.
Potential Impact
For European organizations, this vulnerability poses a substantial risk, especially for those relying on Draytek AP903, AP912C, and AP918R access points in their network infrastructure. Exploitation could lead to unauthorized network access, allowing attackers to intercept, manipulate, or disrupt network traffic. This could compromise confidentiality by exposing sensitive data, integrity by allowing unauthorized changes to network authentication, and availability by potentially disrupting network services. Organizations in sectors with strict data protection requirements, such as finance, healthcare, and critical infrastructure, could face regulatory and reputational damage if this vulnerability is exploited. Additionally, since FreeRadius is often used in enterprise and ISP environments, the impact could extend to service providers and their customers. The absence of known exploits in the wild provides a window for mitigation, but the hardcoded weak password significantly lowers the barrier for attackers who gain network proximity or access to the device management interfaces.
Mitigation Recommendations
European organizations should immediately audit their network devices to identify the presence of the affected Draytek models and firmware versions. Until official patches are released, administrators should manually inspect the clients.conf configuration file on these devices to identify and change the hardcoded secret to a strong, unique password. Network segmentation should be enforced to limit access to management interfaces and RADIUS services only to trusted administrators and systems. Implementing network access controls such as VLANs and firewall rules can reduce exposure. Monitoring network logs for unusual authentication attempts or access patterns related to RADIUS services is critical for early detection. Organizations should also engage with Draytek support to obtain firmware updates or official guidance. Finally, consider replacing affected devices with models that do not have this vulnerability if remediation is not feasible in the short term.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Belgium
CVE-2025-44643: n/a
Description
Certain Draytek products are affected by Insecure Permissions. This affects AP903 v1.4.18 and AP912C v1.4.9 and AP918R v1.4.9. The setting of the secret field in the FreeRadius-related clients.conf configuration file sets a hardcoded weak password, posing a security risk.
AI-Powered Analysis
Technical Analysis
CVE-2025-44643 identifies a security vulnerability in certain Draytek networking products, specifically the AP903 version 1.4.18, AP912C version 1.4.9, and AP918R version 1.4.9. The vulnerability arises from insecure permissions related to the FreeRadius-related clients.conf configuration file. In this file, a 'secret' field is set with a hardcoded weak password. FreeRadius is a widely used open-source RADIUS server that handles authentication, authorization, and accounting for network access. The presence of a hardcoded weak password in the clients.conf file means that attackers with access to the device or network could potentially authenticate against the RADIUS server using this known secret, bypassing normal authentication controls. This could allow unauthorized users to gain access to network resources or manipulate authentication processes. The vulnerability is rooted in insecure configuration management and poor credential handling practices, which undermine the security of the affected devices. Although no known exploits are currently reported in the wild, the weakness presents a significant risk if attackers gain network access or can interact with the RADIUS service. The lack of a CVSS score indicates that the vulnerability has not yet been fully assessed for severity, but the technical details suggest a critical security flaw due to the potential for unauthorized network access. No patches or mitigations are currently linked, indicating that affected organizations must proactively address this issue through configuration changes or firmware updates once available.
Potential Impact
For European organizations, this vulnerability poses a substantial risk, especially for those relying on Draytek AP903, AP912C, and AP918R access points in their network infrastructure. Exploitation could lead to unauthorized network access, allowing attackers to intercept, manipulate, or disrupt network traffic. This could compromise confidentiality by exposing sensitive data, integrity by allowing unauthorized changes to network authentication, and availability by potentially disrupting network services. Organizations in sectors with strict data protection requirements, such as finance, healthcare, and critical infrastructure, could face regulatory and reputational damage if this vulnerability is exploited. Additionally, since FreeRadius is often used in enterprise and ISP environments, the impact could extend to service providers and their customers. The absence of known exploits in the wild provides a window for mitigation, but the hardcoded weak password significantly lowers the barrier for attackers who gain network proximity or access to the device management interfaces.
Mitigation Recommendations
European organizations should immediately audit their network devices to identify the presence of the affected Draytek models and firmware versions. Until official patches are released, administrators should manually inspect the clients.conf configuration file on these devices to identify and change the hardcoded secret to a strong, unique password. Network segmentation should be enforced to limit access to management interfaces and RADIUS services only to trusted administrators and systems. Implementing network access controls such as VLANs and firewall rules can reduce exposure. Monitoring network logs for unusual authentication attempts or access patterns related to RADIUS services is critical for early detection. Organizations should also engage with Draytek support to obtain firmware updates or official guidance. Finally, consider replacing affected devices with models that do not have this vulnerability if remediation is not feasible in the short term.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2025-04-22T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 6890c80aad5a09ad00e1d6d3
Added to database: 8/4/2025, 2:47:38 PM
Last enriched: 8/4/2025, 3:03:18 PM
Last updated: 8/4/2025, 3:17:38 PM
Views: 2
Related Threats
CVE-2025-8516: Path Traversal in Kingdee Cloud-Starry-Sky Enterprise Edition
MediumCVE-2025-5988: Cross-Site Request Forgery (CSRF) in Red Hat Red Hat Ansible Automation Platform 2
MediumCVE-2025-30099: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Dell PowerProtect Data Domain Feature Release
HighCVE-2025-30098: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Dell PowerProtect Data Domain Feature Release
MediumCVE-2025-51536: n/a
CriticalActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.