CVE-2025-49481: CWE-404 Improper Resource Shutdown or Release in ASR Falcon_Linux、Kestrel、Lapwing_Linux
Improper Resource Shutdown or Release vulnerability in ASR180x 、ASR190x in router modules allows Resource Leak Exposure. This vulnerability is associated with program files router/phonebook/pbwork-queue.C. This issue affects Falcon_Linux、Kestrel、Lapwing_Linux: before v1536.
AI Analysis
Technical Summary
CVE-2025-49481 is a medium-severity vulnerability classified under CWE-404, which pertains to improper resource shutdown or release. This vulnerability affects ASR's router products running Falcon_Linux, Kestrel, and Lapwing_Linux operating systems, specifically versions prior to v1536. The issue arises from the improper handling of resources in the program file router/phonebook/pbwork-queue.C, leading to resource leaks. Resource leaks occur when system resources such as memory, file handles, or network sockets are not properly released after use, potentially causing degraded system performance or denial of service over time. The vulnerability has a CVSS 3.1 base score of 5.4, indicating a medium severity level. The vector details (AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L) reveal that the vulnerability can be exploited remotely over the network with low attack complexity, requires low privileges, and no user interaction. The impact primarily affects confidentiality to a limited extent and availability to a low extent, with no impact on integrity. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability is specific to certain ASR router models widely used in network infrastructure, which could lead to resource exhaustion and potential service degradation if exploited.
Potential Impact
For European organizations, especially those relying on ASR routers running Falcon_Linux, Kestrel, or Lapwing_Linux, this vulnerability poses a risk of resource exhaustion that could degrade network performance or cause partial denial of service. While the confidentiality impact is limited, the availability impact could disrupt critical network services, affecting business operations, especially in sectors dependent on continuous network uptime such as finance, telecommunications, and government. The requirement of low privileges for exploitation means that insider threats or attackers who have gained limited access could leverage this vulnerability to impact network stability. Given the central role of routers in enterprise and service provider networks, exploitation could cascade to affect multiple connected systems. However, the absence of known exploits and the medium severity rating suggest that immediate widespread impact is unlikely but should not be ignored.
Mitigation Recommendations
European organizations should prioritize upgrading affected ASR router firmware to version v1536 or later once available to address this vulnerability. In the interim, network administrators should monitor router resource usage closely for signs of resource leaks, such as increasing memory or handle consumption over time. Implementing strict access controls to limit privileged access to router management interfaces can reduce exploitation risk. Network segmentation and traffic filtering can help contain potential exploitation attempts. Additionally, organizations should establish robust logging and alerting mechanisms to detect unusual router behavior indicative of resource exhaustion. Regular vulnerability scanning and penetration testing focused on network infrastructure can help identify exposure. Coordination with ASR support channels for timely patch information and applying vendor-recommended configurations to mitigate resource leaks is also advised.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-49481: CWE-404 Improper Resource Shutdown or Release in ASR Falcon_Linux、Kestrel、Lapwing_Linux
Description
Improper Resource Shutdown or Release vulnerability in ASR180x 、ASR190x in router modules allows Resource Leak Exposure. This vulnerability is associated with program files router/phonebook/pbwork-queue.C. This issue affects Falcon_Linux、Kestrel、Lapwing_Linux: before v1536.
AI-Powered Analysis
Technical Analysis
CVE-2025-49481 is a medium-severity vulnerability classified under CWE-404, which pertains to improper resource shutdown or release. This vulnerability affects ASR's router products running Falcon_Linux, Kestrel, and Lapwing_Linux operating systems, specifically versions prior to v1536. The issue arises from the improper handling of resources in the program file router/phonebook/pbwork-queue.C, leading to resource leaks. Resource leaks occur when system resources such as memory, file handles, or network sockets are not properly released after use, potentially causing degraded system performance or denial of service over time. The vulnerability has a CVSS 3.1 base score of 5.4, indicating a medium severity level. The vector details (AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L) reveal that the vulnerability can be exploited remotely over the network with low attack complexity, requires low privileges, and no user interaction. The impact primarily affects confidentiality to a limited extent and availability to a low extent, with no impact on integrity. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability is specific to certain ASR router models widely used in network infrastructure, which could lead to resource exhaustion and potential service degradation if exploited.
Potential Impact
For European organizations, especially those relying on ASR routers running Falcon_Linux, Kestrel, or Lapwing_Linux, this vulnerability poses a risk of resource exhaustion that could degrade network performance or cause partial denial of service. While the confidentiality impact is limited, the availability impact could disrupt critical network services, affecting business operations, especially in sectors dependent on continuous network uptime such as finance, telecommunications, and government. The requirement of low privileges for exploitation means that insider threats or attackers who have gained limited access could leverage this vulnerability to impact network stability. Given the central role of routers in enterprise and service provider networks, exploitation could cascade to affect multiple connected systems. However, the absence of known exploits and the medium severity rating suggest that immediate widespread impact is unlikely but should not be ignored.
Mitigation Recommendations
European organizations should prioritize upgrading affected ASR router firmware to version v1536 or later once available to address this vulnerability. In the interim, network administrators should monitor router resource usage closely for signs of resource leaks, such as increasing memory or handle consumption over time. Implementing strict access controls to limit privileged access to router management interfaces can reduce exploitation risk. Network segmentation and traffic filtering can help contain potential exploitation attempts. Additionally, organizations should establish robust logging and alerting mechanisms to detect unusual router behavior indicative of resource exhaustion. Regular vulnerability scanning and penetration testing focused on network infrastructure can help identify exposure. Coordination with ASR support channels for timely patch information and applying vendor-recommended configurations to mitigate resource leaks is also advised.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- ASR
- Date Reserved
- 2025-06-05T08:13:26.653Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6863c56a6f40f0eb728f061c
Added to database: 7/1/2025, 11:24:26 AM
Last enriched: 7/1/2025, 11:39:45 AM
Last updated: 7/12/2025, 7:04:03 AM
Views: 13
Related Threats
CVE-2025-41239: CWE-908 Use of Uninitialized Resource in VMware ESXi
HighCVE-2025-41238: CWE-787 Out-of-bounds Write in VMware ESXi
CriticalCVE-2025-41237: CWE-787 Out-of-bounds Write in VMware Cloud Foundation
CriticalCVE-2025-41236: CWE-787 Out-of-bounds Write in VMware ESXi
CriticalCVE-2025-53903: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in The-Scratch-Channel the-scratch-channel.github.io
LowActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.