Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-57176: CWE-434 Unrestricted Upload of File with Dangerous Type in Ceragon Networks / Siklu Communication EtherHaul and MultiHaul Series microwave antennas

0
Medium
VulnerabilityCVE-2025-57176cvecve-2025-57176cwe-434
Published: Mon Sep 15 2025 (09/15/2025, 00:00:00 UTC)
Source: CVE Database V5
Vendor/Project: Ceragon Networks / Siklu Communication
Product: EtherHaul and MultiHaul Series microwave antennas

Description

On Ceragon Networks / Siklu Communication EtherHaul and MultiHaul Series microwave antennas before 2026-03-10, the rfpiped service on TCP port 555 allows unauthenticated file uploads to any writable location on the device. File upload packets use weak encryption (metadata only) with file contents transmitted in cleartext. No authentication or path validation is performed.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/11/2026, 19:09:48 UTC

Technical Analysis

CVE-2025-57176 is a vulnerability classified under CWE-434 (Unrestricted Upload of File with Dangerous Type) affecting multiple models of Ceragon Networks and Siklu Communication EtherHaul and MultiHaul Series microwave antennas. The vulnerability resides in the rfpiped service, which listens on TCP port 555 and allows unauthenticated remote attackers to upload arbitrary files to any writable location on the device's filesystem. The upload mechanism uses weak encryption that protects only metadata, while the actual file contents are transmitted in cleartext, exposing sensitive data to interception or manipulation during transit. Critically, the service performs no authentication or path validation, enabling attackers to place malicious files anywhere writable, potentially leading to unauthorized code execution, device compromise, or information disclosure. The affected product models include a broad range of Ceragon MultiHaul and EtherHaul devices widely used in microwave backhaul and point-to-point wireless communication networks. The vulnerability was published on September 15, 2025, with no known exploits in the wild at the time. The CVSS v3.1 base score is 6.5, indicating medium severity, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and impacts on confidentiality and integrity but not availability. This vulnerability poses a significant risk to the confidentiality and integrity of communications and device operation in critical telecom infrastructure if exploited. Organizations using these devices should prioritize mitigation to prevent unauthorized access and file uploads.

Potential Impact

The vulnerability allows unauthenticated remote attackers to upload arbitrary files to critical microwave antenna devices, potentially leading to several adverse impacts. Confidentiality is at risk because file contents are transmitted in cleartext and can be intercepted, and attackers can upload malicious files that may exfiltrate sensitive data. Integrity is compromised as attackers can overwrite or add files, potentially injecting malicious code or altering device configurations. Although availability is not directly impacted, successful exploitation could lead to device instability or indirect denial of service through malicious payloads. Given that these devices are often part of critical telecommunications infrastructure, exploitation could disrupt network communications, degrade service quality, or facilitate further attacks within the network. The ease of exploitation (no authentication or user interaction required) increases the likelihood of attacks, especially in environments where port 555 is exposed or insufficiently protected. The broad range of affected models means many organizations worldwide could be vulnerable, particularly telecom operators and enterprises relying on these microwave links for backhaul connectivity.

Mitigation Recommendations

1. Immediately restrict network access to TCP port 555 on all affected devices using firewalls, access control lists, or network segmentation to limit exposure to trusted management networks only. 2. Monitor network traffic for unusual file upload attempts or connections to port 555 from unauthorized sources. 3. Implement strong encryption and authentication controls at the network perimeter to prevent unauthorized access to device management interfaces. 4. Coordinate with Ceragon Networks / Siklu Communication for official patches or firmware updates addressing this vulnerability and apply them promptly once available. 5. Conduct thorough audits of device file systems to detect and remove any unauthorized or suspicious files. 6. Employ intrusion detection/prevention systems (IDS/IPS) tuned to detect exploitation attempts targeting this vulnerability. 7. Review and harden device configurations to disable unnecessary services or restrict writable directories where possible. 8. Establish incident response procedures specifically for microwave antenna infrastructure to quickly respond to potential compromises.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-08-17T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68c8469be8cf1c5173493843

Added to database: 9/15/2025, 5:02:19 PM

Last enriched: 3/11/2026, 7:09:48 PM

Last updated: 3/24/2026, 11:48:43 PM

Views: 114

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses