CVE-2025-49483: CWE-404 Improper Resource Shutdown or Release in ASR Falcon_Linux、Kestrel、Lapwing_Linux
Improper Resource Shutdown or Release vulnerability in ASR180x 、ASR190x in tr069 modules allows Resource Leak Exposure. This vulnerability is associated with program files tr069/tr069_uci.c. This issue affects Falcon_Linux、Kestrel、Lapwing_Linux: before v1536.
AI Analysis
Technical Summary
CVE-2025-49483 is a medium-severity vulnerability classified under CWE-404 (Improper Resource Shutdown or Release) affecting ASR's Falcon_Linux, Kestrel, and Lapwing_Linux products, specifically in the tr069 modules of ASR180x and ASR190x devices. The vulnerability arises from improper handling of resource shutdown or release in the program files tr069/tr069_uci.c, leading to resource leaks. Resource leaks can cause gradual degradation of system performance or availability due to exhaustion of critical resources such as memory or file descriptors. The vulnerability affects versions prior to v1536 and requires network access (AV:N) with low attack complexity (AC:L) but does require privileges (PR:L) on the system. No user interaction is needed (UI:N). The CVSS v3.1 base score is 5.4, indicating a medium severity impact primarily on availability and confidentiality, with no impact on integrity. The vulnerability does not have known exploits in the wild as of now. The improper resource release could allow an attacker with limited privileges to cause resource exhaustion, potentially leading to denial of service or information exposure through resource leakages in network management modules (TR-069).
Potential Impact
For European organizations, especially those utilizing ASR's Falcon_Linux, Kestrel, or Lapwing_Linux devices in their network infrastructure, this vulnerability could lead to degraded network device performance or outages due to resource exhaustion. The affected devices are likely used in telecommunications or enterprise network management contexts, where TR-069 modules facilitate remote management. Resource leaks could impact availability of critical network services, causing operational disruptions. Confidentiality impact, while limited, could arise if leaked resources expose sensitive management information. Given the medium severity and requirement for some privilege level, the threat is moderate but could be leveraged in multi-stage attacks or combined with other vulnerabilities. The absence of known exploits reduces immediate risk but does not eliminate it, especially in environments with privileged users or attackers who have gained limited access. European organizations relying on these devices for network management should be aware of potential service degradation and plan remediation accordingly.
Mitigation Recommendations
1. Upgrade affected ASR devices to version v1536 or later where the vulnerability is patched. 2. Restrict privileged access to the affected devices and modules to minimize the risk of exploitation by limiting PR:L attack vector. 3. Monitor resource utilization metrics on affected devices to detect abnormal resource consumption indicative of exploitation attempts. 4. Implement network segmentation and access controls to limit exposure of TR-069 management interfaces to trusted networks only. 5. Regularly audit and review device configurations and logs for signs of resource leaks or anomalous behavior. 6. Coordinate with ASR vendor support for any available patches or workarounds and apply them promptly. 7. Consider deploying intrusion detection systems capable of identifying unusual patterns in network management traffic related to TR-069.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden
CVE-2025-49483: CWE-404 Improper Resource Shutdown or Release in ASR Falcon_Linux、Kestrel、Lapwing_Linux
Description
Improper Resource Shutdown or Release vulnerability in ASR180x 、ASR190x in tr069 modules allows Resource Leak Exposure. This vulnerability is associated with program files tr069/tr069_uci.c. This issue affects Falcon_Linux、Kestrel、Lapwing_Linux: before v1536.
AI-Powered Analysis
Technical Analysis
CVE-2025-49483 is a medium-severity vulnerability classified under CWE-404 (Improper Resource Shutdown or Release) affecting ASR's Falcon_Linux, Kestrel, and Lapwing_Linux products, specifically in the tr069 modules of ASR180x and ASR190x devices. The vulnerability arises from improper handling of resource shutdown or release in the program files tr069/tr069_uci.c, leading to resource leaks. Resource leaks can cause gradual degradation of system performance or availability due to exhaustion of critical resources such as memory or file descriptors. The vulnerability affects versions prior to v1536 and requires network access (AV:N) with low attack complexity (AC:L) but does require privileges (PR:L) on the system. No user interaction is needed (UI:N). The CVSS v3.1 base score is 5.4, indicating a medium severity impact primarily on availability and confidentiality, with no impact on integrity. The vulnerability does not have known exploits in the wild as of now. The improper resource release could allow an attacker with limited privileges to cause resource exhaustion, potentially leading to denial of service or information exposure through resource leakages in network management modules (TR-069).
Potential Impact
For European organizations, especially those utilizing ASR's Falcon_Linux, Kestrel, or Lapwing_Linux devices in their network infrastructure, this vulnerability could lead to degraded network device performance or outages due to resource exhaustion. The affected devices are likely used in telecommunications or enterprise network management contexts, where TR-069 modules facilitate remote management. Resource leaks could impact availability of critical network services, causing operational disruptions. Confidentiality impact, while limited, could arise if leaked resources expose sensitive management information. Given the medium severity and requirement for some privilege level, the threat is moderate but could be leveraged in multi-stage attacks or combined with other vulnerabilities. The absence of known exploits reduces immediate risk but does not eliminate it, especially in environments with privileged users or attackers who have gained limited access. European organizations relying on these devices for network management should be aware of potential service degradation and plan remediation accordingly.
Mitigation Recommendations
1. Upgrade affected ASR devices to version v1536 or later where the vulnerability is patched. 2. Restrict privileged access to the affected devices and modules to minimize the risk of exploitation by limiting PR:L attack vector. 3. Monitor resource utilization metrics on affected devices to detect abnormal resource consumption indicative of exploitation attempts. 4. Implement network segmentation and access controls to limit exposure of TR-069 management interfaces to trusted networks only. 5. Regularly audit and review device configurations and logs for signs of resource leaks or anomalous behavior. 6. Coordinate with ASR vendor support for any available patches or workarounds and apply them promptly. 7. Consider deploying intrusion detection systems capable of identifying unusual patterns in network management traffic related to TR-069.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- ASR
- Date Reserved
- 2025-06-05T08:13:26.653Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6863c9006f40f0eb728f0ee1
Added to database: 7/1/2025, 11:39:44 AM
Last enriched: 7/1/2025, 11:54:46 AM
Last updated: 7/1/2025, 11:54:46 AM
Views: 2
Related Threats
CVE-2025-22624: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in bradvin FooGallery - Responsive Photo Gallery, Image Viewer, Justified, Masonry & Carousel
MediumCVE-2025-5314: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in dearhive Dear Flipbook – PDF Flipbook, 3D Flipbook, PDF embed, PDF viewer
MediumCVE-2025-49482: CWE-404 Improper Resource Shutdown or Release in ASR Falcon_Linux、Kestrel、Lapwing_Linux
MediumCVE-2025-6952: Reachable Assertion in Open5GS
MediumCVE-2025-6951: Use of Default Credentials in SAFECAM X300
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.