CVE-2025-57174: n/a
An issue was discovered in Siklu Communications Etherhaul 8010TX and 1200FX devices, Firmware 7.4.0 through 10.7.3 and possibly other previous versions. The rfpiped service listening on TCP port 555 which uses static AES encryption keys hardcoded in the binary. These keys are identical across all devices, allowing attackers to craft encrypted packets that execute arbitrary commands without authentication. This is a failed patch for CVE-2017-7318. This issue may affect other Etherhaul series devices with shared firmware.
AI Analysis
Technical Summary
CVE-2025-57174 is a critical vulnerability affecting Siklu Communications Etherhaul 8010TX and 1200FX devices, specifically firmware versions 7.4.0 through 10.7.3, and potentially other earlier versions and Etherhaul series devices sharing similar firmware. The vulnerability resides in the rfpiped service, which listens on TCP port 555 and employs static AES encryption keys hardcoded within the binary. These keys are identical across all affected devices, enabling attackers to craft encrypted packets that can bypass authentication mechanisms and execute arbitrary commands remotely. This vulnerability is a failed patch of a previous issue identified as CVE-2017-7318, indicating that the underlying cryptographic flaw was not properly remediated. The use of static, hardcoded encryption keys (classified under CWE-321) severely undermines the confidentiality and integrity of communications, allowing unauthenticated remote code execution (RCE) with no user interaction required. The CVSS v3.1 score of 9.8 reflects the critical nature of this vulnerability, highlighting its network attack vector, low attack complexity, no privileges or user interaction required, and full impact on confidentiality, integrity, and availability. Although no known exploits are currently reported in the wild, the ease of exploitation and the severity of impact make this a high-priority security concern for organizations using these devices. The vulnerability affects critical network infrastructure components used in wireless backhaul communications, which are essential for high-capacity data transmission in metropolitan and rural network deployments.
Potential Impact
For European organizations, the exploitation of CVE-2025-57174 could have severe consequences. Etherhaul devices are commonly deployed by telecom operators, internet service providers, and critical infrastructure entities to provide high-speed wireless backhaul links. Successful exploitation could lead to unauthorized remote control of these devices, enabling attackers to disrupt network availability, intercept or manipulate sensitive data, and potentially pivot to other internal systems. This could result in widespread service outages, data breaches, and compromise of critical communication infrastructure. Given the role of these devices in supporting broadband and enterprise connectivity, the impact extends to sectors such as finance, healthcare, government, and industrial control systems. The lack of authentication and the ability to execute arbitrary commands remotely make this vulnerability particularly dangerous, as attackers could deploy malware, disrupt network traffic, or establish persistent footholds without detection. The failure to properly patch the original CVE-2017-7318 vulnerability also raises concerns about the vendor's security practices and the potential for similar issues in related products, increasing the risk profile for European networks relying on these devices.
Mitigation Recommendations
To mitigate the risks posed by CVE-2025-57174, European organizations should take immediate and specific actions beyond generic best practices: 1) Identify all Siklu Etherhaul devices in their network, focusing on models 8010TX and 1200FX and other Etherhaul series potentially sharing the vulnerable firmware. 2) Isolate affected devices from untrusted networks, especially restricting access to TCP port 555 to trusted management networks only, using network segmentation and firewall rules. 3) Engage with Siklu Communications to obtain updated firmware versions that properly address this vulnerability; if no patch is currently available, request vendor guidance or consider device replacement. 4) Implement network monitoring and intrusion detection systems tuned to detect anomalous traffic on port 555 and signs of command injection attempts. 5) Employ strict access controls and multi-factor authentication on management interfaces to reduce the attack surface. 6) Conduct regular security audits and penetration testing focused on wireless backhaul infrastructure to identify and remediate similar weaknesses. 7) Develop incident response plans specific to network infrastructure compromise scenarios to ensure rapid containment and recovery. These targeted measures will help reduce exposure and mitigate potential exploitation until a secure firmware update is deployed.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden, Poland, Belgium, Austria
CVE-2025-57174: n/a
Description
An issue was discovered in Siklu Communications Etherhaul 8010TX and 1200FX devices, Firmware 7.4.0 through 10.7.3 and possibly other previous versions. The rfpiped service listening on TCP port 555 which uses static AES encryption keys hardcoded in the binary. These keys are identical across all devices, allowing attackers to craft encrypted packets that execute arbitrary commands without authentication. This is a failed patch for CVE-2017-7318. This issue may affect other Etherhaul series devices with shared firmware.
AI-Powered Analysis
Technical Analysis
CVE-2025-57174 is a critical vulnerability affecting Siklu Communications Etherhaul 8010TX and 1200FX devices, specifically firmware versions 7.4.0 through 10.7.3, and potentially other earlier versions and Etherhaul series devices sharing similar firmware. The vulnerability resides in the rfpiped service, which listens on TCP port 555 and employs static AES encryption keys hardcoded within the binary. These keys are identical across all affected devices, enabling attackers to craft encrypted packets that can bypass authentication mechanisms and execute arbitrary commands remotely. This vulnerability is a failed patch of a previous issue identified as CVE-2017-7318, indicating that the underlying cryptographic flaw was not properly remediated. The use of static, hardcoded encryption keys (classified under CWE-321) severely undermines the confidentiality and integrity of communications, allowing unauthenticated remote code execution (RCE) with no user interaction required. The CVSS v3.1 score of 9.8 reflects the critical nature of this vulnerability, highlighting its network attack vector, low attack complexity, no privileges or user interaction required, and full impact on confidentiality, integrity, and availability. Although no known exploits are currently reported in the wild, the ease of exploitation and the severity of impact make this a high-priority security concern for organizations using these devices. The vulnerability affects critical network infrastructure components used in wireless backhaul communications, which are essential for high-capacity data transmission in metropolitan and rural network deployments.
Potential Impact
For European organizations, the exploitation of CVE-2025-57174 could have severe consequences. Etherhaul devices are commonly deployed by telecom operators, internet service providers, and critical infrastructure entities to provide high-speed wireless backhaul links. Successful exploitation could lead to unauthorized remote control of these devices, enabling attackers to disrupt network availability, intercept or manipulate sensitive data, and potentially pivot to other internal systems. This could result in widespread service outages, data breaches, and compromise of critical communication infrastructure. Given the role of these devices in supporting broadband and enterprise connectivity, the impact extends to sectors such as finance, healthcare, government, and industrial control systems. The lack of authentication and the ability to execute arbitrary commands remotely make this vulnerability particularly dangerous, as attackers could deploy malware, disrupt network traffic, or establish persistent footholds without detection. The failure to properly patch the original CVE-2017-7318 vulnerability also raises concerns about the vendor's security practices and the potential for similar issues in related products, increasing the risk profile for European networks relying on these devices.
Mitigation Recommendations
To mitigate the risks posed by CVE-2025-57174, European organizations should take immediate and specific actions beyond generic best practices: 1) Identify all Siklu Etherhaul devices in their network, focusing on models 8010TX and 1200FX and other Etherhaul series potentially sharing the vulnerable firmware. 2) Isolate affected devices from untrusted networks, especially restricting access to TCP port 555 to trusted management networks only, using network segmentation and firewall rules. 3) Engage with Siklu Communications to obtain updated firmware versions that properly address this vulnerability; if no patch is currently available, request vendor guidance or consider device replacement. 4) Implement network monitoring and intrusion detection systems tuned to detect anomalous traffic on port 555 and signs of command injection attempts. 5) Employ strict access controls and multi-factor authentication on management interfaces to reduce the attack surface. 6) Conduct regular security audits and penetration testing focused on wireless backhaul infrastructure to identify and remediate similar weaknesses. 7) Develop incident response plans specific to network infrastructure compromise scenarios to ensure rapid containment and recovery. These targeted measures will help reduce exposure and mitigate potential exploitation until a secure firmware update is deployed.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
 - 5.1
 - Assigner Short Name
 - mitre
 - Date Reserved
 - 2025-08-17T00:00:00.000Z
 - Cvss Version
 - 3.1
 - State
 - PUBLISHED
 
Threat ID: 68c85fca5c6c1197c2b41eb4
Added to database: 9/15/2025, 6:49:46 PM
Last enriched: 9/15/2025, 6:50:10 PM
Last updated: 11/4/2025, 3:43:51 AM
Views: 50
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-12324: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in tobiasbg TablePress – Tables in WordPress made easy
MediumCVE-2025-43507: An app may be able to fingerprint the user in Apple visionOS
MediumCVE-2025-43505: Processing a maliciously crafted file may lead to heap corruption in Apple Xcode
HighCVE-2025-43504: A user in a privileged network position may be able to cause a denial-of-service in Apple Xcode
MediumCVE-2025-43503: Visiting a malicious website may lead to user interface spoofing in Apple Safari
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.