Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-65885: n/a

0
Unknown
VulnerabilityCVE-2025-65885cvecve-2025-65885
Published: Fri Dec 26 2025 (12/26/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

An issue was discovered in the Delight Custom Firmware (CFW) for Nokia Symbian Belle devices on Nokia 808 (Delight v1.8), Nokia N8 (Delight v6.7), Nokia E7 (Delight v1.3), Nokia C7 (Delight v6.7), Nokia 700 (Delight v1.2), Nokia 701 (Delight v1.1), Nokia 603 (Delight v1.0), Nokia 500 (Delight v1.2), Nokia E6 (Delight v1.0), Nokia Oro (Delight v1.0), and Vertu Constellation T (Delight v1.0) allowing local attackers to inject startup scripts via crafted .txt files in the :\Data directory.

AI-Powered Analysis

AILast updated: 12/26/2025, 14:56:42 UTC

Technical Analysis

CVE-2025-65885 identifies a local code injection vulnerability in the Delight Custom Firmware (CFW) tailored for Nokia Symbian Belle devices, including models such as Nokia 808, N8, E7, C7, 700, 701, 603, 500, E6, Oro, and Vertu Constellation T. The flaw arises from insufficient validation of .txt files placed in the :\Data directory, which the firmware processes during device startup. An attacker with local access can craft malicious .txt files that inject startup scripts, enabling arbitrary code execution with the privileges of the firmware startup process. This can compromise device integrity by allowing persistent malicious code execution, potentially leading to data leakage or further compromise of connected systems. The vulnerability does not require network access or authentication but does require the attacker to have local file system access, which could be achieved through physical access or via other local exploits. No CVSS score has been assigned, and no patches or known exploits are currently documented. Given the age and niche use of Symbian Belle devices, the threat surface is limited but relevant for legacy device users. The vulnerability highlights risks in custom firmware environments where startup script handling lacks robust input validation and access controls.

Potential Impact

For European organizations, the impact of CVE-2025-65885 is primarily relevant to those maintaining legacy mobile devices running Symbian Belle with Delight CFW, often in specialized industrial, governmental, or telecommunications contexts. Successful exploitation could lead to unauthorized code execution on affected devices, compromising device integrity and potentially exposing sensitive data stored locally. This could facilitate lateral movement if the device connects to internal networks or is used for secure communications. The vulnerability undermines trust in device startup processes, potentially allowing persistent malware installation. However, given the requirement for local access and the limited market share of these devices, the overall risk to large-scale enterprise operations is low. Nonetheless, organizations relying on these devices for critical functions should consider the risk of insider threats or physical compromise. The lack of available patches increases the risk of prolonged exposure. Confidentiality, integrity, and availability of device functions could be impacted, especially if attackers leverage this vulnerability to implant persistent malware or disrupt device operations.

Mitigation Recommendations

To mitigate CVE-2025-65885, organizations should first inventory and identify any Nokia Symbian Belle devices running Delight CFW within their environment. Restrict physical and local access to these devices to trusted personnel only, minimizing the risk of unauthorized file placement. Implement strict file system permissions on the :\Data directory to prevent unauthorized creation or modification of .txt files. Monitor device startup scripts and logs for unusual or unauthorized entries indicative of script injection attempts. Where possible, isolate these legacy devices from critical networks or sensitive data environments to limit potential lateral movement. Consider replacing or upgrading legacy devices to supported platforms with active security maintenance. If replacement is not feasible, develop compensating controls such as enhanced endpoint monitoring and physical security measures. Engage with Delight CFW maintainers or community to seek patches or updates addressing this vulnerability. Finally, educate users and administrators about the risks of local file manipulation on these devices.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-11-18T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 694e9f3b2bc1afab4ba470b0

Added to database: 12/26/2025, 2:44:11 PM

Last enriched: 12/26/2025, 2:56:42 PM

Last updated: 12/26/2025, 4:31:07 PM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats