Skip to main content

CVE-2025-55053: CWE-328: Use of Weak Hash in Baicells NOVA430e/430i, NOVA436Q, NEUTRINO430, NOVA846

Medium
VulnerabilityCVE-2025-55053cvecve-2025-55053cwe-328
Published: Tue Sep 09 2025 (09/09/2025, 19:10:49 UTC)
Source: CVE Database V5
Vendor/Project: Baicells
Product: NOVA430e/430i, NOVA436Q, NEUTRINO430, NOVA846

Description

CWE-328: Use of Weak Hash

AI-Powered Analysis

AILast updated: 09/09/2025, 19:20:02 UTC

Technical Analysis

CVE-2025-55053 is a medium severity vulnerability identified in several Baicells products, including NOVA430e/430i, NOVA436Q, NEUTRINO430, and NOVA846. The vulnerability is categorized under CWE-328, which refers to the use of weak cryptographic hash functions. Specifically, these Baicells devices, in affected firmware versions BaiBLQ_3.0.12 and older, and BaiBU_DNB4_2.4.9 and older, implement weak hashing algorithms that compromise the security of cryptographic operations. The CVSS v3.1 base score is 6.5, with vector AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N, indicating that the vulnerability can be exploited remotely over the network with low attack complexity, requires low privileges, no user interaction, and impacts confidentiality with high severity but does not affect integrity or availability. The use of weak hashes can allow attackers to perform cryptographic attacks such as collision or preimage attacks, potentially enabling them to recover sensitive information or bypass security mechanisms that rely on the hash function. Although no known exploits are currently reported in the wild, the vulnerability poses a significant risk to the confidentiality of data processed or transmitted by these devices. Baicells products are commonly used in wireless broadband infrastructure, including LTE and 5G small cells, making this vulnerability relevant to telecommunications operators and enterprises relying on these devices for network connectivity.

Potential Impact

For European organizations, this vulnerability could lead to unauthorized disclosure of sensitive data transmitted or stored by affected Baicells devices. Telecommunications providers using these products in their network infrastructure may face confidentiality breaches, potentially exposing subscriber data or network configuration details. This could undermine customer trust and violate data protection regulations such as GDPR. Additionally, enterprises deploying these devices for private LTE or 5G networks may experience leakage of proprietary or operational information. While the vulnerability does not directly impact integrity or availability, the confidentiality breach alone can have serious legal and reputational consequences. Given the remote network exploitability and low complexity, attackers could leverage this weakness to intercept or decrypt sensitive communications. The absence of known exploits in the wild suggests that immediate widespread attacks are unlikely, but the vulnerability should be addressed promptly to prevent future exploitation.

Mitigation Recommendations

Organizations should prioritize updating affected Baicells devices to the latest firmware versions that address this vulnerability once available. In the absence of patches, network administrators should implement compensating controls such as isolating affected devices within secure network segments, enforcing strict access controls to limit privileged user accounts, and monitoring network traffic for anomalous activities indicative of exploitation attempts. Employing additional encryption layers (e.g., IPsec or TLS) over communications involving these devices can mitigate risks associated with weak hashes. Regularly auditing device configurations and cryptographic settings to ensure compliance with current security standards is recommended. Vendors and operators should collaborate to accelerate the development and deployment of patches. Finally, organizations should maintain up-to-date asset inventories to identify all affected devices and ensure comprehensive remediation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
INCD
Date Reserved
2025-08-06T11:04:25.088Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68c07dca2a45f782fdb17798

Added to database: 9/9/2025, 7:19:38 PM

Last enriched: 9/9/2025, 7:20:02 PM

Last updated: 9/9/2025, 9:12:27 PM

Views: 4

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats