CVE-2025-54083: CWE-922 Insecure Storage of Sensitive Information in Calix GigaCenter ONT
Insecure Storage of Sensitive Information vulnerability in Calix GigaCenter ONT (Quantenna SoC modules) allows admin access to the web interface.This issue affects GigaCenter ONT: 844E, 844G, 844GE, 854GE.
AI Analysis
Technical Summary
CVE-2025-54083 is a medium-severity vulnerability classified under CWE-922 (Insecure Storage of Sensitive Information) affecting Calix GigaCenter Optical Network Terminals (ONTs), specifically models 844E, 844G, 844GE, and 854GE. These devices incorporate Quantenna SoC modules and serve as critical network endpoints for broadband connectivity, often deployed by ISPs and enterprises. The vulnerability arises from improper storage of sensitive information within the device, which can be exploited by an attacker with network-level access (as indicated by the CVSS vector AV:P - Physical or local network access required). Exploiting this flaw allows an attacker to gain administrative access to the web interface of the ONT without authentication, thereby compromising device management controls. This unauthorized access could enable attackers to alter configurations, intercept or redirect traffic, or use the device as a pivot point for further network intrusion. The vulnerability does not require user interaction or privileges and does not affect confidentiality or integrity of data beyond the device management interface itself, but it does have a high impact on availability (VC:H) as attackers could disrupt device operation. No known exploits are reported in the wild yet, and no patches have been linked at the time of publication. The vulnerability was reserved in mid-2025 and published in September 2025, indicating recent discovery and disclosure. The CVSS 4.0 score of 5.1 reflects a medium risk primarily due to the requirement of local network access and lack of authentication bypass complexity.
Potential Impact
For European organizations, this vulnerability poses a significant risk particularly to ISPs, telecommunications providers, and enterprises using Calix GigaCenter ONTs for broadband access. Unauthorized administrative access to ONTs can lead to service disruptions, interception of customer traffic, and potential lateral movement within corporate or ISP networks. This could degrade network availability and trust in service providers. Given the role of ONTs as the demarcation point between customer premises and service provider networks, exploitation could also facilitate broader attacks on subscriber data privacy and network infrastructure. The impact is heightened in critical infrastructure sectors relying on stable broadband connectivity, such as finance, healthcare, and government services. Although exploitation requires local network access, compromised devices within an ISP’s managed network or a corporate LAN could be leveraged by attackers to escalate privileges or disrupt services. The lack of authentication for administrative access increases the risk of insider threats or attackers who gain initial footholds in the network.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should: 1) Immediately inventory and identify all Calix GigaCenter ONT models 844E, 844G, 844GE, and 854GE in their networks. 2) Restrict physical and network access to ONTs, ensuring that only trusted personnel and systems can reach the device management interfaces. 3) Implement network segmentation and access control lists (ACLs) to isolate ONT management interfaces from general user networks and the internet. 4) Monitor network traffic for unusual access patterns to ONT web interfaces, including unauthorized administrative login attempts. 5) Engage with Calix for firmware updates or patches addressing this vulnerability; if unavailable, consider temporary compensating controls such as disabling web management interfaces or changing default credentials if possible. 6) Conduct regular security audits and penetration tests focused on ONT devices to detect potential exploitation attempts. 7) Educate network administrators and support staff about the risks of insecure storage vulnerabilities and the importance of securing device management channels.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden, Poland, Austria
CVE-2025-54083: CWE-922 Insecure Storage of Sensitive Information in Calix GigaCenter ONT
Description
Insecure Storage of Sensitive Information vulnerability in Calix GigaCenter ONT (Quantenna SoC modules) allows admin access to the web interface.This issue affects GigaCenter ONT: 844E, 844G, 844GE, 854GE.
AI-Powered Analysis
Technical Analysis
CVE-2025-54083 is a medium-severity vulnerability classified under CWE-922 (Insecure Storage of Sensitive Information) affecting Calix GigaCenter Optical Network Terminals (ONTs), specifically models 844E, 844G, 844GE, and 854GE. These devices incorporate Quantenna SoC modules and serve as critical network endpoints for broadband connectivity, often deployed by ISPs and enterprises. The vulnerability arises from improper storage of sensitive information within the device, which can be exploited by an attacker with network-level access (as indicated by the CVSS vector AV:P - Physical or local network access required). Exploiting this flaw allows an attacker to gain administrative access to the web interface of the ONT without authentication, thereby compromising device management controls. This unauthorized access could enable attackers to alter configurations, intercept or redirect traffic, or use the device as a pivot point for further network intrusion. The vulnerability does not require user interaction or privileges and does not affect confidentiality or integrity of data beyond the device management interface itself, but it does have a high impact on availability (VC:H) as attackers could disrupt device operation. No known exploits are reported in the wild yet, and no patches have been linked at the time of publication. The vulnerability was reserved in mid-2025 and published in September 2025, indicating recent discovery and disclosure. The CVSS 4.0 score of 5.1 reflects a medium risk primarily due to the requirement of local network access and lack of authentication bypass complexity.
Potential Impact
For European organizations, this vulnerability poses a significant risk particularly to ISPs, telecommunications providers, and enterprises using Calix GigaCenter ONTs for broadband access. Unauthorized administrative access to ONTs can lead to service disruptions, interception of customer traffic, and potential lateral movement within corporate or ISP networks. This could degrade network availability and trust in service providers. Given the role of ONTs as the demarcation point between customer premises and service provider networks, exploitation could also facilitate broader attacks on subscriber data privacy and network infrastructure. The impact is heightened in critical infrastructure sectors relying on stable broadband connectivity, such as finance, healthcare, and government services. Although exploitation requires local network access, compromised devices within an ISP’s managed network or a corporate LAN could be leveraged by attackers to escalate privileges or disrupt services. The lack of authentication for administrative access increases the risk of insider threats or attackers who gain initial footholds in the network.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should: 1) Immediately inventory and identify all Calix GigaCenter ONT models 844E, 844G, 844GE, and 854GE in their networks. 2) Restrict physical and network access to ONTs, ensuring that only trusted personnel and systems can reach the device management interfaces. 3) Implement network segmentation and access control lists (ACLs) to isolate ONT management interfaces from general user networks and the internet. 4) Monitor network traffic for unusual access patterns to ONT web interfaces, including unauthorized administrative login attempts. 5) Engage with Calix for firmware updates or patches addressing this vulnerability; if unavailable, consider temporary compensating controls such as disabling web management interfaces or changing default credentials if possible. 6) Conduct regular security audits and penetration tests focused on ONT devices to detect potential exploitation attempts. 7) Educate network administrators and support staff about the risks of insecure storage vulnerabilities and the importance of securing device management channels.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Fluid Attacks
- Date Reserved
- 2025-07-16T15:11:01.684Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68c08ee596774cc5680167b9
Added to database: 9/9/2025, 8:32:37 PM
Last enriched: 9/9/2025, 8:36:10 PM
Last updated: 9/9/2025, 9:35:33 PM
Views: 4
Related Threats
CVE-2025-59039: CWE-506: Embedded Malicious Code in prebid prebid-universal-creative
CriticalCVE-2025-59036: CWE-298: Improper Validation of Certificate Expiration in opsmill infrahub
MediumCVE-2025-10171: Buffer Overflow in UTT 1250GW
HighCVE-2025-54260: Out-of-bounds Read (CWE-125) in Adobe Substance3D - Modeler
HighCVE-2025-54259: Integer Overflow or Wraparound (CWE-190) in Adobe Substance3D - Modeler
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.