Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-55051: CWE-1392: Use of Default Credentials in Baicells NOVA430e/430i, NOVA436Q, NEUTRINO430, NOVA846

0
Critical
VulnerabilityCVE-2025-55051cvecve-2025-55051cwe-1392
Published: Tue Sep 09 2025 (09/09/2025, 19:01:43 UTC)
Source: CVE Database V5
Vendor/Project: Baicells
Product: NOVA430e/430i, NOVA436Q, NEUTRINO430, NOVA846

Description

CWE-1392: Use of Default Credentials

AI-Powered Analysis

AILast updated: 09/17/2025, 01:03:13 UTC

Technical Analysis

CVE-2025-55051 is a critical vulnerability identified in multiple Baicells products, including NOVA430e/430i, NOVA436Q, NEUTRINO430, and NOVA846. The vulnerability is classified under CWE-1392, which pertains to the use of default credentials. Specifically, affected versions BaiBLQ_3.0.12 and older, and BaiBU_DNB4_2.4.9 and older, ship with default usernames and passwords that are not changed or enforced to be changed upon deployment. This flaw allows an unauthenticated attacker to remotely access these devices over the network without any user interaction or privileges. The CVSS v3.1 base score is 10.0, indicating a critical severity with the vector AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H. This means the attack can be performed remotely over the network with low attack complexity, no privileges or user interaction required, and the impact affects confidentiality, integrity, and availability at a complete scope. Exploiting this vulnerability would allow an attacker to fully compromise the affected devices, potentially gaining administrative control, intercepting or manipulating data, disrupting service, or using the devices as a foothold for further attacks. Baicells devices are typically used in wireless broadband infrastructure, including LTE and 5G small cell deployments, which are critical components in telecommunications networks. Although no known exploits are currently reported in the wild, the severity and ease of exploitation make this a significant threat that requires immediate attention.

Potential Impact

For European organizations, this vulnerability poses a severe risk especially to telecom operators, internet service providers, and enterprises relying on Baicells equipment for wireless broadband connectivity. Successful exploitation could lead to full compromise of network infrastructure components, resulting in data breaches, service outages, and potential disruption of critical communications services. Given the strategic importance of telecommunications infrastructure in Europe for both commercial and governmental operations, attackers could leverage this vulnerability to conduct espionage, sabotage, or launch further attacks against connected networks. The confidentiality of sensitive communications could be breached, integrity of transmitted data compromised, and availability of services severely impacted. Additionally, compromised devices could be used as pivot points for lateral movement within networks or as part of botnets for large-scale attacks. The criticality of this vulnerability demands rapid remediation to protect European digital infrastructure and maintain trust in telecommunications services.

Mitigation Recommendations

1. Immediate patching: Organizations should upgrade affected Baicells devices to the latest firmware versions where default credentials are removed or enforced to be changed. Since no patch links are provided, contacting Baicells support for updated firmware or mitigation guidance is essential. 2. Change default credentials: If patching is not immediately possible, administrators must manually change all default usernames and passwords on affected devices to strong, unique credentials. 3. Network segmentation: Isolate Baicells devices within dedicated network segments with strict access controls to limit exposure to untrusted networks. 4. Implement strong authentication: Where possible, enable multi-factor authentication or integrate devices with centralized authentication systems to reduce risk from credential compromise. 5. Monitor and audit: Deploy continuous monitoring and logging to detect unauthorized access attempts or anomalous behavior on these devices. 6. Access control lists: Restrict management interfaces to trusted IP addresses only, preventing unauthorized remote access. 7. Incident response readiness: Prepare response plans for potential exploitation, including device isolation and forensic analysis. 8. Vendor engagement: Engage with Baicells for updates on patches, advisories, and best practices to secure their products.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
INCD
Date Reserved
2025-08-06T11:04:25.088Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68c07ba9b6075907d2127ccd

Added to database: 9/9/2025, 7:10:33 PM

Last enriched: 9/17/2025, 1:03:13 AM

Last updated: 10/30/2025, 9:57:52 AM

Views: 36

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats