Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-57174: n/a

0
Critical
VulnerabilityCVE-2025-57174cvecve-2025-57174
Published: Mon Sep 15 2025 (09/15/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

An issue was discovered in Siklu Communications Etherhaul 8010TX and 1200FX devices, Firmware 7.4.0 through 10.7.3 and possibly other previous versions. The rfpiped service listening on TCP port 555 which uses static AES encryption keys hardcoded in the binary. These keys are identical across all devices, allowing attackers to craft encrypted packets that execute arbitrary commands without authentication. This is a failed patch for CVE-2017-7318. This issue may affect other Etherhaul series devices with shared firmware.

AI-Powered Analysis

AILast updated: 09/15/2025, 18:50:10 UTC

Technical Analysis

CVE-2025-57174 is a critical vulnerability affecting Siklu Communications Etherhaul 8010TX and 1200FX devices, specifically firmware versions 7.4.0 through 10.7.3, and potentially other earlier versions and Etherhaul series devices sharing similar firmware. The vulnerability resides in the rfpiped service, which listens on TCP port 555 and employs static AES encryption keys hardcoded within the binary. These keys are identical across all affected devices, enabling attackers to craft encrypted packets that can bypass authentication mechanisms and execute arbitrary commands remotely. This vulnerability is a failed patch of a previous issue identified as CVE-2017-7318, indicating that the underlying cryptographic flaw was not properly remediated. The use of static, hardcoded encryption keys (classified under CWE-321) severely undermines the confidentiality and integrity of communications, allowing unauthenticated remote code execution (RCE) with no user interaction required. The CVSS v3.1 score of 9.8 reflects the critical nature of this vulnerability, highlighting its network attack vector, low attack complexity, no privileges or user interaction required, and full impact on confidentiality, integrity, and availability. Although no known exploits are currently reported in the wild, the ease of exploitation and the severity of impact make this a high-priority security concern for organizations using these devices. The vulnerability affects critical network infrastructure components used in wireless backhaul communications, which are essential for high-capacity data transmission in metropolitan and rural network deployments.

Potential Impact

For European organizations, the exploitation of CVE-2025-57174 could have severe consequences. Etherhaul devices are commonly deployed by telecom operators, internet service providers, and critical infrastructure entities to provide high-speed wireless backhaul links. Successful exploitation could lead to unauthorized remote control of these devices, enabling attackers to disrupt network availability, intercept or manipulate sensitive data, and potentially pivot to other internal systems. This could result in widespread service outages, data breaches, and compromise of critical communication infrastructure. Given the role of these devices in supporting broadband and enterprise connectivity, the impact extends to sectors such as finance, healthcare, government, and industrial control systems. The lack of authentication and the ability to execute arbitrary commands remotely make this vulnerability particularly dangerous, as attackers could deploy malware, disrupt network traffic, or establish persistent footholds without detection. The failure to properly patch the original CVE-2017-7318 vulnerability also raises concerns about the vendor's security practices and the potential for similar issues in related products, increasing the risk profile for European networks relying on these devices.

Mitigation Recommendations

To mitigate the risks posed by CVE-2025-57174, European organizations should take immediate and specific actions beyond generic best practices: 1) Identify all Siklu Etherhaul devices in their network, focusing on models 8010TX and 1200FX and other Etherhaul series potentially sharing the vulnerable firmware. 2) Isolate affected devices from untrusted networks, especially restricting access to TCP port 555 to trusted management networks only, using network segmentation and firewall rules. 3) Engage with Siklu Communications to obtain updated firmware versions that properly address this vulnerability; if no patch is currently available, request vendor guidance or consider device replacement. 4) Implement network monitoring and intrusion detection systems tuned to detect anomalous traffic on port 555 and signs of command injection attempts. 5) Employ strict access controls and multi-factor authentication on management interfaces to reduce the attack surface. 6) Conduct regular security audits and penetration testing focused on wireless backhaul infrastructure to identify and remediate similar weaknesses. 7) Develop incident response plans specific to network infrastructure compromise scenarios to ensure rapid containment and recovery. These targeted measures will help reduce exposure and mitigate potential exploitation until a secure firmware update is deployed.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-08-17T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68c85fca5c6c1197c2b41eb4

Added to database: 9/15/2025, 6:49:46 PM

Last enriched: 9/15/2025, 6:50:10 PM

Last updated: 11/3/2025, 10:15:02 PM

Views: 49

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats