CVE-2025-55052: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in Baicells NEUTRINO430, NOVA436Q, NOVA430e/430i, NOVA846, NOVA246, NOVA243, NOVA233, NOVA227
CWE-200 Exposure of Sensitive Information to an Unauthorized Actor
AI Analysis
Technical Summary
CVE-2025-55052 is a medium-severity vulnerability classified under CWE-200, which involves the exposure of sensitive information to unauthorized actors. This vulnerability affects multiple Baicells products, including NEUTRINO430, NOVA436Q, NOVA430e/430i, NOVA846, NOVA246, NOVA243, NOVA233, and NOVA227, specifically in versions running BaiBS_RTS_3.. and older and BaiBS_RTD_3.. and older firmware. The vulnerability allows an attacker with network access and low privileges (PR:L) to remotely access sensitive information without requiring user interaction (UI:N). The CVSS 3.1 base score is 4.3, indicating a medium impact primarily on confidentiality (C:L), with no impact on integrity or availability. The attack vector is network-based (AV:N), and the scope remains unchanged (S:U). Although no known exploits are currently in the wild and no patches have been published yet, the exposure of sensitive data could facilitate further attacks or unauthorized surveillance. The affected devices are typically used in wireless broadband infrastructure, often deployed by telecom operators and ISPs to provide LTE or 5G services. Sensitive information exposure could include configuration details, credentials, or network parameters that could be leveraged to compromise network security or privacy.
Potential Impact
For European organizations, especially telecom operators, ISPs, and enterprises relying on Baicells equipment for wireless broadband connectivity, this vulnerability poses a risk of unauthorized disclosure of sensitive network information. Such exposure could lead to targeted attacks, including unauthorized network access, interception of communications, or preparation for more severe attacks. Given the critical role of these devices in providing connectivity, any compromise could affect service confidentiality and customer privacy. While the vulnerability does not directly impact system integrity or availability, the leakage of sensitive information could undermine trust and regulatory compliance, particularly under GDPR, which mandates protection of personal and network data. The medium severity suggests a moderate risk, but the lack of patches and the network-exploitable nature mean that organizations should prioritize mitigation to prevent potential escalation or exploitation.
Mitigation Recommendations
Organizations should immediately inventory Baicells devices in their networks to identify affected versions. Until patches are available, network segmentation should be enforced to restrict access to management interfaces and sensitive device endpoints, limiting exposure to trusted internal networks only. Implement strict access controls and monitoring on network segments hosting these devices to detect anomalous access attempts. Use VPNs or encrypted tunnels for remote management to prevent interception. Regularly audit device configurations to ensure no unnecessary services or ports are exposed. Engage with Baicells support to obtain timelines for patches or firmware updates and apply them promptly once released. Additionally, consider deploying intrusion detection systems (IDS) tuned to detect reconnaissance or data exfiltration attempts targeting these devices. Finally, update incident response plans to include scenarios involving sensitive information exposure from network infrastructure equipment.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden, Belgium, Austria
CVE-2025-55052: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in Baicells NEUTRINO430, NOVA436Q, NOVA430e/430i, NOVA846, NOVA246, NOVA243, NOVA233, NOVA227
Description
CWE-200 Exposure of Sensitive Information to an Unauthorized Actor
AI-Powered Analysis
Technical Analysis
CVE-2025-55052 is a medium-severity vulnerability classified under CWE-200, which involves the exposure of sensitive information to unauthorized actors. This vulnerability affects multiple Baicells products, including NEUTRINO430, NOVA436Q, NOVA430e/430i, NOVA846, NOVA246, NOVA243, NOVA233, and NOVA227, specifically in versions running BaiBS_RTS_3.. and older and BaiBS_RTD_3.. and older firmware. The vulnerability allows an attacker with network access and low privileges (PR:L) to remotely access sensitive information without requiring user interaction (UI:N). The CVSS 3.1 base score is 4.3, indicating a medium impact primarily on confidentiality (C:L), with no impact on integrity or availability. The attack vector is network-based (AV:N), and the scope remains unchanged (S:U). Although no known exploits are currently in the wild and no patches have been published yet, the exposure of sensitive data could facilitate further attacks or unauthorized surveillance. The affected devices are typically used in wireless broadband infrastructure, often deployed by telecom operators and ISPs to provide LTE or 5G services. Sensitive information exposure could include configuration details, credentials, or network parameters that could be leveraged to compromise network security or privacy.
Potential Impact
For European organizations, especially telecom operators, ISPs, and enterprises relying on Baicells equipment for wireless broadband connectivity, this vulnerability poses a risk of unauthorized disclosure of sensitive network information. Such exposure could lead to targeted attacks, including unauthorized network access, interception of communications, or preparation for more severe attacks. Given the critical role of these devices in providing connectivity, any compromise could affect service confidentiality and customer privacy. While the vulnerability does not directly impact system integrity or availability, the leakage of sensitive information could undermine trust and regulatory compliance, particularly under GDPR, which mandates protection of personal and network data. The medium severity suggests a moderate risk, but the lack of patches and the network-exploitable nature mean that organizations should prioritize mitigation to prevent potential escalation or exploitation.
Mitigation Recommendations
Organizations should immediately inventory Baicells devices in their networks to identify affected versions. Until patches are available, network segmentation should be enforced to restrict access to management interfaces and sensitive device endpoints, limiting exposure to trusted internal networks only. Implement strict access controls and monitoring on network segments hosting these devices to detect anomalous access attempts. Use VPNs or encrypted tunnels for remote management to prevent interception. Regularly audit device configurations to ensure no unnecessary services or ports are exposed. Engage with Baicells support to obtain timelines for patches or firmware updates and apply them promptly once released. Additionally, consider deploying intrusion detection systems (IDS) tuned to detect reconnaissance or data exfiltration attempts targeting these devices. Finally, update incident response plans to include scenarios involving sensitive information exposure from network infrastructure equipment.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- INCD
- Date Reserved
- 2025-08-06T11:04:25.088Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68c07ba9b6075907d2127cd0
Added to database: 9/9/2025, 7:10:33 PM
Last enriched: 9/9/2025, 7:11:14 PM
Last updated: 9/9/2025, 7:11:14 PM
Views: 2
Related Threats
CVE-2025-58768: CWE-94: Improper Control of Generation of Code ('Code Injection') in ThinkInAIXYZ deepchat
CriticalCVE-2025-58765: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in webrecorder wabac.js
HighCVE-2025-44593: n/a
HighCVE-2025-34177: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Netgate pfSense CE
MediumCVE-2025-34176: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Netgate pfSense CE
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.