CVE-2025-55051: CWE-1392: Use of Default Credentials in Baicells NOVA430e/430i, NOVA436Q, NEUTRINO430, NOVA846
CWE-1392: Use of Default Credentials
AI Analysis
Technical Summary
CVE-2025-55051 is a critical vulnerability identified in multiple Baicells products, including NOVA430e/430i, NOVA436Q, NEUTRINO430, and NOVA846. The vulnerability is classified under CWE-1392, which pertains to the use of default credentials. Specifically, affected versions BaiBLQ_3.0.12 and older, and BaiBU_DNB4_2.4.9 and older, ship with default usernames and passwords that are not changed or enforced to be changed upon deployment. This flaw allows an unauthenticated attacker to remotely access these devices over the network without any user interaction or privileges. The CVSS v3.1 base score is 10.0, indicating a critical severity with the vector AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H. This means the attack can be performed remotely over the network with low attack complexity, no privileges or user interaction required, and the impact affects confidentiality, integrity, and availability at a complete scope. Exploiting this vulnerability would allow an attacker to fully compromise the affected devices, potentially gaining administrative control, intercepting or manipulating data, disrupting service, or using the devices as a foothold for further attacks. Baicells devices are typically used in wireless broadband infrastructure, including LTE and 5G small cell deployments, which are critical components in telecommunications networks. Although no known exploits are currently reported in the wild, the severity and ease of exploitation make this a significant threat that requires immediate attention.
Potential Impact
For European organizations, this vulnerability poses a severe risk especially to telecom operators, internet service providers, and enterprises relying on Baicells equipment for wireless broadband connectivity. Successful exploitation could lead to full compromise of network infrastructure components, resulting in data breaches, service outages, and potential disruption of critical communications services. Given the strategic importance of telecommunications infrastructure in Europe for both commercial and governmental operations, attackers could leverage this vulnerability to conduct espionage, sabotage, or launch further attacks against connected networks. The confidentiality of sensitive communications could be breached, integrity of transmitted data compromised, and availability of services severely impacted. Additionally, compromised devices could be used as pivot points for lateral movement within networks or as part of botnets for large-scale attacks. The criticality of this vulnerability demands rapid remediation to protect European digital infrastructure and maintain trust in telecommunications services.
Mitigation Recommendations
1. Immediate patching: Organizations should upgrade affected Baicells devices to the latest firmware versions where default credentials are removed or enforced to be changed. Since no patch links are provided, contacting Baicells support for updated firmware or mitigation guidance is essential. 2. Change default credentials: If patching is not immediately possible, administrators must manually change all default usernames and passwords on affected devices to strong, unique credentials. 3. Network segmentation: Isolate Baicells devices within dedicated network segments with strict access controls to limit exposure to untrusted networks. 4. Implement strong authentication: Where possible, enable multi-factor authentication or integrate devices with centralized authentication systems to reduce risk from credential compromise. 5. Monitor and audit: Deploy continuous monitoring and logging to detect unauthorized access attempts or anomalous behavior on these devices. 6. Access control lists: Restrict management interfaces to trusted IP addresses only, preventing unauthorized remote access. 7. Incident response readiness: Prepare response plans for potential exploitation, including device isolation and forensic analysis. 8. Vendor engagement: Engage with Baicells for updates on patches, advisories, and best practices to secure their products.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden, Belgium, Finland
CVE-2025-55051: CWE-1392: Use of Default Credentials in Baicells NOVA430e/430i, NOVA436Q, NEUTRINO430, NOVA846
Description
CWE-1392: Use of Default Credentials
AI-Powered Analysis
Technical Analysis
CVE-2025-55051 is a critical vulnerability identified in multiple Baicells products, including NOVA430e/430i, NOVA436Q, NEUTRINO430, and NOVA846. The vulnerability is classified under CWE-1392, which pertains to the use of default credentials. Specifically, affected versions BaiBLQ_3.0.12 and older, and BaiBU_DNB4_2.4.9 and older, ship with default usernames and passwords that are not changed or enforced to be changed upon deployment. This flaw allows an unauthenticated attacker to remotely access these devices over the network without any user interaction or privileges. The CVSS v3.1 base score is 10.0, indicating a critical severity with the vector AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H. This means the attack can be performed remotely over the network with low attack complexity, no privileges or user interaction required, and the impact affects confidentiality, integrity, and availability at a complete scope. Exploiting this vulnerability would allow an attacker to fully compromise the affected devices, potentially gaining administrative control, intercepting or manipulating data, disrupting service, or using the devices as a foothold for further attacks. Baicells devices are typically used in wireless broadband infrastructure, including LTE and 5G small cell deployments, which are critical components in telecommunications networks. Although no known exploits are currently reported in the wild, the severity and ease of exploitation make this a significant threat that requires immediate attention.
Potential Impact
For European organizations, this vulnerability poses a severe risk especially to telecom operators, internet service providers, and enterprises relying on Baicells equipment for wireless broadband connectivity. Successful exploitation could lead to full compromise of network infrastructure components, resulting in data breaches, service outages, and potential disruption of critical communications services. Given the strategic importance of telecommunications infrastructure in Europe for both commercial and governmental operations, attackers could leverage this vulnerability to conduct espionage, sabotage, or launch further attacks against connected networks. The confidentiality of sensitive communications could be breached, integrity of transmitted data compromised, and availability of services severely impacted. Additionally, compromised devices could be used as pivot points for lateral movement within networks or as part of botnets for large-scale attacks. The criticality of this vulnerability demands rapid remediation to protect European digital infrastructure and maintain trust in telecommunications services.
Mitigation Recommendations
1. Immediate patching: Organizations should upgrade affected Baicells devices to the latest firmware versions where default credentials are removed or enforced to be changed. Since no patch links are provided, contacting Baicells support for updated firmware or mitigation guidance is essential. 2. Change default credentials: If patching is not immediately possible, administrators must manually change all default usernames and passwords on affected devices to strong, unique credentials. 3. Network segmentation: Isolate Baicells devices within dedicated network segments with strict access controls to limit exposure to untrusted networks. 4. Implement strong authentication: Where possible, enable multi-factor authentication or integrate devices with centralized authentication systems to reduce risk from credential compromise. 5. Monitor and audit: Deploy continuous monitoring and logging to detect unauthorized access attempts or anomalous behavior on these devices. 6. Access control lists: Restrict management interfaces to trusted IP addresses only, preventing unauthorized remote access. 7. Incident response readiness: Prepare response plans for potential exploitation, including device isolation and forensic analysis. 8. Vendor engagement: Engage with Baicells for updates on patches, advisories, and best practices to secure their products.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- INCD
- Date Reserved
- 2025-08-06T11:04:25.088Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68c07ba9b6075907d2127ccd
Added to database: 9/9/2025, 7:10:33 PM
Last enriched: 9/17/2025, 1:03:13 AM
Last updated: 10/30/2025, 9:57:52 AM
Views: 36
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-54941: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Apache Software Foundation Apache Airflow
UnknownCVE-2025-54471: CWE-321: Use of Hard-coded Cryptographic Key in SUSE neuvector
MediumCVE-2025-54469: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in SUSE neuvector
CriticalCVE-2025-54470: CWE-295: Improper Certificate Validation in SUSE neuvector
HighCVE-2025-62503: CWE-250: Execution with Unnecessary Privileges in Apache Software Foundation Apache Airflow
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.