Skip to main content

CVE-2025-53914: CWE-269 Improper Privilege Management in Calix GigaCenter ONT

High
VulnerabilityCVE-2025-53914cvecve-2025-53914cwe-269
Published: Tue Sep 09 2025 (09/09/2025, 19:59:27 UTC)
Source: CVE Database V5
Vendor/Project: Calix
Product: GigaCenter ONT

Description

Excessive Privileges vulnerability in Calix GigaCenter ONT (Broadcom SoC modules) allows Privilege Abuse.This issue affects GigaCenter ONT: 844E, 844G, 844GE, 854GE, 812G, 813G, 818G.

AI-Powered Analysis

AILast updated: 09/09/2025, 21:13:10 UTC

Technical Analysis

CVE-2025-53914 is a high-severity vulnerability classified under CWE-269 (Improper Privilege Management) affecting multiple models of the Calix GigaCenter Optical Network Terminal (ONT) devices, specifically the 844E, 844G, 844GE, 854GE, 812G, 813G, and 818G. These devices incorporate Broadcom System on Chip (SoC) modules and are widely deployed as customer premises equipment (CPE) to provide fiber optic broadband connectivity. The vulnerability arises from excessive privileges granted within the device's software, allowing unauthorized privilege abuse. According to the CVSS 4.0 vector (CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N), the attack vector is physical (AV:P), requiring local access to the device, but with low attack complexity (AC:L), no privileges or authentication required (PR:N, AT:N), and no user interaction (UI:N). The impact on confidentiality, integrity, and availability is high (VC:H, VI:H, VA:H), indicating that an attacker with physical access can fully compromise the device’s security posture, potentially gaining administrative control, extracting sensitive data, or disrupting service. There are no known exploits in the wild yet, and no patches have been published at the time of this report. The vulnerability is significant because improper privilege management in network edge devices can lead to lateral movement within networks, interception or manipulation of traffic, and persistent footholds for attackers. The lack of authentication and user interaction requirements further increases the risk if an attacker gains physical access to the device.

Potential Impact

For European organizations, this vulnerability poses a substantial risk, especially for Internet Service Providers (ISPs), telecommunications companies, and enterprises deploying Calix GigaCenter ONTs in their fiber broadband infrastructure. Exploitation could lead to unauthorized access to network management functions, interception or modification of customer traffic, and disruption of broadband services. This can compromise confidentiality of customer data, integrity of network configurations, and availability of internet connectivity. Given the high reliance on fiber broadband for critical communications, business operations, and increasingly for remote work, exploitation could result in significant operational disruptions and reputational damage. Furthermore, compromised ONTs could be used as entry points for broader network intrusions or as platforms for launching attacks against other network segments. The physical access requirement somewhat limits remote exploitation but does not eliminate risk in environments where devices are accessible to end users or third parties. This is particularly relevant in multi-tenant buildings, public access points, or poorly secured customer premises.

Mitigation Recommendations

1. Physical Security: Strengthen physical security controls to restrict unauthorized access to ONT devices, including secure installation locations and tamper-evident seals. 2. Network Segmentation: Isolate ONTs on separate network segments with strict access controls to limit lateral movement if a device is compromised. 3. Monitoring and Logging: Implement enhanced monitoring of ONT device logs and network traffic for unusual activity indicative of privilege abuse. 4. Firmware Updates: Engage with Calix to obtain patches or firmware updates addressing this vulnerability as soon as they become available and apply them promptly. 5. Access Controls: Where possible, configure device management interfaces to require authentication and limit management access to trusted personnel and systems. 6. Device Replacement: For high-risk environments where patching is delayed or unavailable, consider replacing vulnerable ONT models with devices from vendors with stronger privilege management controls. 7. Incident Response: Develop and rehearse incident response plans specific to ONT compromise scenarios to minimize impact and recovery time.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Fluid Attacks
Date Reserved
2025-07-11T22:32:54.176Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68c0983c9ed239a66bacc0f5

Added to database: 9/9/2025, 9:12:28 PM

Last enriched: 9/9/2025, 9:13:10 PM

Last updated: 9/10/2025, 4:07:21 AM

Views: 4

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats