Skip to main content

CVE-2025-49483: CWE-404 Improper Resource Shutdown or Release in ASR Falcon_Linux、Kestrel、Lapwing_Linux

Medium
VulnerabilityCVE-2025-49483cvecve-2025-49483cwe-404
Published: Tue Jul 01 2025 (07/01/2025, 11:31:32 UTC)
Source: CVE Database V5
Vendor/Project: ASR
Product: Falcon_Linux、Kestrel、Lapwing_Linux

Description

Improper Resource Shutdown or Release vulnerability in ASR180x 、ASR190x in tr069 modules allows Resource Leak Exposure. This vulnerability is associated with program files tr069/tr069_uci.c. This issue affects Falcon_Linux、Kestrel、Lapwing_Linux: before v1536.

AI-Powered Analysis

AILast updated: 07/01/2025, 11:54:46 UTC

Technical Analysis

CVE-2025-49483 is a medium-severity vulnerability classified under CWE-404 (Improper Resource Shutdown or Release) affecting ASR's Falcon_Linux, Kestrel, and Lapwing_Linux products, specifically in the tr069 modules of ASR180x and ASR190x devices. The vulnerability arises from improper handling of resource shutdown or release in the program files tr069/tr069_uci.c, leading to resource leaks. Resource leaks can cause gradual degradation of system performance or availability due to exhaustion of critical resources such as memory or file descriptors. The vulnerability affects versions prior to v1536 and requires network access (AV:N) with low attack complexity (AC:L) but does require privileges (PR:L) on the system. No user interaction is needed (UI:N). The CVSS v3.1 base score is 5.4, indicating a medium severity impact primarily on availability and confidentiality, with no impact on integrity. The vulnerability does not have known exploits in the wild as of now. The improper resource release could allow an attacker with limited privileges to cause resource exhaustion, potentially leading to denial of service or information exposure through resource leakages in network management modules (TR-069).

Potential Impact

For European organizations, especially those utilizing ASR's Falcon_Linux, Kestrel, or Lapwing_Linux devices in their network infrastructure, this vulnerability could lead to degraded network device performance or outages due to resource exhaustion. The affected devices are likely used in telecommunications or enterprise network management contexts, where TR-069 modules facilitate remote management. Resource leaks could impact availability of critical network services, causing operational disruptions. Confidentiality impact, while limited, could arise if leaked resources expose sensitive management information. Given the medium severity and requirement for some privilege level, the threat is moderate but could be leveraged in multi-stage attacks or combined with other vulnerabilities. The absence of known exploits reduces immediate risk but does not eliminate it, especially in environments with privileged users or attackers who have gained limited access. European organizations relying on these devices for network management should be aware of potential service degradation and plan remediation accordingly.

Mitigation Recommendations

1. Upgrade affected ASR devices to version v1536 or later where the vulnerability is patched. 2. Restrict privileged access to the affected devices and modules to minimize the risk of exploitation by limiting PR:L attack vector. 3. Monitor resource utilization metrics on affected devices to detect abnormal resource consumption indicative of exploitation attempts. 4. Implement network segmentation and access controls to limit exposure of TR-069 management interfaces to trusted networks only. 5. Regularly audit and review device configurations and logs for signs of resource leaks or anomalous behavior. 6. Coordinate with ASR vendor support for any available patches or workarounds and apply them promptly. 7. Consider deploying intrusion detection systems capable of identifying unusual patterns in network management traffic related to TR-069.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
ASR
Date Reserved
2025-06-05T08:13:26.653Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6863c9006f40f0eb728f0ee1

Added to database: 7/1/2025, 11:39:44 AM

Last enriched: 7/1/2025, 11:54:46 AM

Last updated: 7/1/2025, 11:54:46 AM

Views: 2

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats