Skip to main content

CVE-2025-48219: CWE-201 Insertion of Sensitive Information Into Sent Data in O2 UK O2

Low
VulnerabilityCVE-2025-48219cvecve-2025-48219cwe-201
Published: Sun May 18 2025 (05/18/2025, 00:00:00 UTC)
Source: CVE
Vendor/Project: O2 UK
Product: O2

Description

O2 UK before 2025-05-19 allows subscribers to determine the Cell ID of other subscribers by initiating an IMS (IP Multimedia Subsystem) call and then reading the utran-cell-id-3gpp field of a Cellular-Network-Info SIP header, aka an ECI (E-UTRAN Cell Identity) leak. The Cell ID might be usable to identify a cell location via crowdsourced data, and might correspond to a small physical area (e.g., if the called party is in a city centre). Removal of the Cellular-Network-Info header is mentioned in section 4.4.19 of ETSI TS 124 229.

AI-Powered Analysis

AILast updated: 07/11/2025, 16:33:17 UTC

Technical Analysis

CVE-2025-48219 is a vulnerability identified in the O2 UK mobile network infrastructure affecting IMS (IP Multimedia Subsystem) calls. Specifically, before the patch date of May 19, 2025, O2 UK allows subscribers to obtain the Cell ID of other subscribers by initiating an IMS call and reading the utran-cell-id-3gpp field within the Cellular-Network-Info SIP header. This field contains the E-UTRAN Cell Identity (ECI), which can be correlated with physical cell tower locations. Since cell IDs can be mapped to geographic locations using crowdsourced databases, an attacker or subscriber could infer the approximate physical location of another subscriber, potentially down to a small area such as a city center. This vulnerability is classified under CWE-201, which involves the insertion of sensitive information into sent data, leading to unintended information disclosure. The issue arises because the Cellular-Network-Info header is not removed or sanitized as recommended by ETSI TS 124 229 section 4.4.19, which specifies that such sensitive information should be excluded from SIP signaling messages to protect subscriber privacy. The CVSS v3.1 score is 3.5 (low severity), reflecting that the vulnerability requires network access (AV:N), has high attack complexity (AC:H), requires low privileges (PR:L), and no user interaction (UI:N). The impact is limited to confidentiality (C:L) with no effect on integrity or availability. No known exploits are reported in the wild, and no patches are currently linked, indicating that mitigation may rely on vendor updates or network operator configuration changes.

Potential Impact

For European organizations, particularly telecommunications providers and enterprises relying on O2 UK network services or similar IMS-based telephony systems, this vulnerability poses a privacy risk rather than a direct operational threat. The ability to infer subscriber location through leaked Cell ID data can lead to privacy violations, targeted surveillance, or profiling of individuals. Organizations handling sensitive communications or subject to strict data protection regulations such as GDPR must be aware that subscriber location data leakage could constitute a personal data breach. Although the vulnerability does not allow direct compromise of network integrity or availability, the exposure of location information could be exploited by malicious actors for stalking, targeted phishing, or other social engineering attacks. Enterprises with employees using O2 UK services may face indirect risks if adversaries leverage location data to facilitate further attacks. The low severity score reflects the limited scope and complexity, but the privacy implications remain significant in the European context where data protection is paramount.

Mitigation Recommendations

To mitigate CVE-2025-48219, O2 UK and similar network operators should promptly implement the removal or sanitization of the Cellular-Network-Info SIP header as per ETSI TS 124 229 section 4.4.19. This involves configuring IMS signaling components to exclude or mask the utran-cell-id-3gpp field before forwarding SIP messages to subscribers. Network operators should audit their IMS call flows and SIP header contents to ensure no sensitive location identifiers are leaked. Subscribers and enterprises should monitor for vendor patches or network operator advisories and apply updates as soon as they become available. Additionally, organizations can implement network-level monitoring to detect anomalous IMS call patterns that may indicate attempts to exploit this vulnerability. Raising user awareness about the potential privacy risks of IMS calls and encouraging cautious use of IMS-based services can also reduce exposure. Finally, regulatory bodies should engage with telecom providers to enforce compliance with privacy standards and ensure timely remediation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-05-18T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f81484d88663aeb491

Added to database: 5/20/2025, 6:59:04 PM

Last enriched: 7/11/2025, 4:33:17 PM

Last updated: 8/18/2025, 11:28:41 PM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats