Skip to main content

CVE-2025-55049: CWE-1394 in Baicells NEUTRINO430

Critical
VulnerabilityCVE-2025-55049cvecve-2025-55049cwe-1394
Published: Tue Sep 09 2025 (09/09/2025, 18:52:00 UTC)
Source: CVE Database V5
Vendor/Project: Baicells
Product: NEUTRINO430

Description

Use of Default Cryptographic Key (CWE-1394)

AI-Powered Analysis

AILast updated: 09/09/2025, 18:56:08 UTC

Technical Analysis

CVE-2025-55049 is a critical vulnerability identified in the Baicells NEUTRINO430 product, specifically affecting version BaiBLQ_3.0.12. The vulnerability is categorized under CWE-1394, which corresponds to the use of a default cryptographic key. This means that the device employs a hardcoded or default cryptographic key for securing communications or data, which is not unique per device or customer. An attacker with network access can exploit this weakness to decrypt sensitive information or impersonate legitimate devices, leading to a compromise of confidentiality and integrity. The CVSS v3.1 score of 9.1 (critical) reflects the high severity of this vulnerability, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction needed (UI:N). The scope is unchanged (S:U), but the impact on confidentiality and integrity is high (C:H/I:H), while availability is not affected (A:N). The lack of a patch link suggests that a fix may not yet be publicly available, increasing the urgency for mitigation. Baicells NEUTRINO430 is a wireless broadband access product used in telecommunications infrastructure, often deployed in fixed wireless access networks. Exploitation could allow attackers to intercept or manipulate network traffic, potentially undermining the security of communications and services relying on these devices.

Potential Impact

For European organizations, especially telecommunications providers and enterprises relying on Baicells NEUTRINO430 for fixed wireless broadband access, this vulnerability poses a significant risk. Exploitation could lead to unauthorized interception of sensitive data, including customer information and internal communications, violating data protection regulations such as GDPR. Integrity compromise could allow attackers to inject malicious traffic or disrupt service configurations, potentially leading to service degradation or targeted attacks on critical infrastructure. Given the critical CVSS score and the network-based attack vector without requiring authentication or user interaction, the threat could be exploited remotely and stealthily. This elevates the risk for national telecom operators, ISPs, and enterprises in sectors like finance, healthcare, and government that depend on secure wireless connectivity. The absence of known exploits in the wild currently reduces immediate risk, but the critical nature demands prompt action to prevent future exploitation.

Mitigation Recommendations

Organizations using Baicells NEUTRINO430 should immediately assess their deployment of version BaiBLQ_3.0.12 and restrict network access to management interfaces to trusted networks only. Employ network segmentation and strict firewall rules to limit exposure of vulnerable devices to untrusted networks. Monitor network traffic for anomalies indicative of cryptographic key misuse or unauthorized access attempts. Engage with Baicells support to obtain information on patches or firmware updates addressing this vulnerability and plan for rapid deployment once available. If patches are not yet released, consider temporary mitigations such as disabling vulnerable features or replacing affected devices with alternatives that do not use default cryptographic keys. Additionally, implement strong encryption at higher network layers (e.g., VPNs, TLS) to protect data in transit, mitigating risks from compromised device-level encryption. Conduct regular security audits and penetration testing focused on wireless infrastructure to identify and remediate related weaknesses.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
INCD
Date Reserved
2025-08-06T11:04:25.088Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68c0782035242cb3d0f995a7

Added to database: 9/9/2025, 6:55:28 PM

Last enriched: 9/9/2025, 6:56:08 PM

Last updated: 9/9/2025, 9:12:27 PM

Views: 3

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats