Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-55053: CWE-328: Use of Weak Hash in Baicells NOVA430e/430i, NOVA436Q, NEUTRINO430, NOVA846

0
Medium
VulnerabilityCVE-2025-55053cvecve-2025-55053cwe-328
Published: Tue Sep 09 2025 (09/09/2025, 19:10:49 UTC)
Source: CVE Database V5
Vendor/Project: Baicells
Product: NOVA430e/430i, NOVA436Q, NEUTRINO430, NOVA846

Description

CWE-328: Use of Weak Hash

AI-Powered Analysis

AILast updated: 09/17/2025, 01:04:12 UTC

Technical Analysis

CVE-2025-55053 is a medium severity vulnerability identified in several Baicells products, including the NOVA430e/430i, NOVA436Q, NEUTRINO430, and NOVA846 models. The vulnerability is classified under CWE-328, which pertains to the use of weak cryptographic hash functions. Specifically, these Baicells devices, running firmware versions BaiBLQ_3.0.12 and older or BaiBU_DNB4_2.4.9 and older, employ cryptographic hashes that are considered weak by modern security standards. Weak hashes can be susceptible to collision attacks or preimage attacks, allowing an attacker to potentially manipulate or spoof data integrity checks. The CVSS v3.1 base score for this vulnerability is 6.5, indicating a medium severity level. The vector string (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N) reveals that the attack can be executed remotely over the network with low attack complexity, requires low privileges, and no user interaction. The impact is primarily on confidentiality, with no direct effect on integrity or availability. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability's presence in network infrastructure devices used for wireless broadband or LTE/5G access points could allow attackers to intercept or decrypt sensitive communications or credentials if they exploit the weak hash usage, potentially leading to unauthorized data disclosure.

Potential Impact

For European organizations, especially those relying on Baicells network equipment for wireless broadband or private LTE/5G deployments, this vulnerability poses a risk to the confidentiality of transmitted data. Attackers exploiting the weak hash could intercept or manipulate authentication tokens or session data, leading to unauthorized access to network resources or sensitive information. This is particularly critical for sectors such as telecommunications providers, critical infrastructure operators, and enterprises deploying private wireless networks. The medium severity and the requirement for low privileges suggest that insider threats or compromised internal accounts could leverage this vulnerability to escalate data exposure. While the vulnerability does not affect integrity or availability directly, the confidentiality breach could facilitate further attacks or espionage. Given the increasing adoption of private LTE/5G networks in Europe for industrial automation, smart cities, and IoT, the impact could extend to operational technology environments, increasing the risk of data leakage or surveillance.

Mitigation Recommendations

Organizations should prioritize upgrading Baicells devices to firmware versions newer than BaiBLQ_3.0.12 and BaiBU_DNB4_2.4.9 once patches become available. In the interim, network administrators should implement compensating controls such as segmenting vulnerable devices on isolated network segments with strict access controls to limit exposure. Employing network-level encryption (e.g., IPsec tunnels) can help protect data confidentiality despite weak hashes in device firmware. Monitoring network traffic for unusual patterns or unauthorized access attempts targeting Baicells devices is recommended. Additionally, enforcing strict privilege management to reduce the number of users with low-level access can limit exploitation potential. Vendors and users should engage with Baicells support channels to obtain updates or workarounds. Finally, organizations should conduct regular security assessments of their wireless infrastructure to detect and remediate cryptographic weaknesses proactively.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
INCD
Date Reserved
2025-08-06T11:04:25.088Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68c07dca2a45f782fdb17798

Added to database: 9/9/2025, 7:19:38 PM

Last enriched: 9/17/2025, 1:04:12 AM

Last updated: 10/29/2025, 6:07:41 PM

Views: 37

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats