Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-67112: n/a

0
Unknown
VulnerabilityCVE-2025-67112cvecve-2025-67112
Published: Thu Mar 19 2026 (03/19/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

Use of a hard-coded AES-256-CBC key in the configuration backup/restore implementation of Small Cell Sercomm SCE4255W (FreedomFi Englewood) firmware before DG3934v3@2308041842 allows remote authenticated users to decrypt, modify, and re-encrypt device configurations, enabling credential manipulation and privilege escalation via the GUI import/export functions.

AI-Powered Analysis

AILast updated: 03/19/2026, 17:55:15 UTC

Technical Analysis

CVE-2025-67112 is a cryptographic vulnerability found in the Small Cell Sercomm SCE4255W (FreedomFi Englewood) firmware versions prior to DG3934v3@2308041842. The issue stems from the use of a hard-coded AES-256-CBC encryption key embedded within the device's configuration backup and restore mechanisms. This key is used to encrypt and decrypt configuration files that can be exported or imported through the device's graphical user interface (GUI). Because the key is hard-coded and static, any remote authenticated user who can access the GUI import/export functions can decrypt existing configuration backups, modify sensitive parameters such as credentials or privilege settings, and then re-encrypt the configuration files. When these manipulated configurations are restored, the attacker can escalate privileges or gain unauthorized access to device functions. The vulnerability requires authentication to the device’s GUI, but no further user interaction is needed once authenticated. This flaw compromises the confidentiality and integrity of device configurations and could lead to privilege escalation, potentially allowing attackers to control or disrupt the device. No public exploits have been reported yet, and no CVSS score has been assigned. The vulnerability affects a specific firmware version of a widely used small cell device in certain telecom and private network deployments.

Potential Impact

The vulnerability allows attackers with valid credentials to fully decrypt and modify device configurations, which can lead to unauthorized privilege escalation and credential manipulation. This undermines the confidentiality and integrity of the device’s configuration data, potentially allowing attackers to gain administrative control or disrupt network operations. Organizations deploying these devices in private LTE/5G networks or telecom infrastructure could face risks including unauthorized network access, interception of communications, and service disruption. The ability to alter configurations remotely increases the attack surface and could facilitate lateral movement within networks. Although exploitation requires authentication, compromised or weak credentials could enable attackers to leverage this vulnerability. The absence of a patch at the time of disclosure means affected organizations remain exposed until firmware updates are applied. The impact is particularly critical for environments relying on these devices for secure network access and communications.

Mitigation Recommendations

1. Immediately update affected devices to firmware version DG3934v3@2308041842 or later, where the hard-coded key issue is resolved. 2. Restrict GUI access to trusted networks and enforce strong authentication mechanisms, including multi-factor authentication if supported. 3. Regularly audit and rotate device credentials to reduce the risk of credential compromise. 4. Monitor device logs for unusual import/export activity that could indicate exploitation attempts. 5. Employ network segmentation to isolate small cell devices from broader enterprise networks, limiting attacker movement. 6. If firmware updates are not immediately available, consider disabling configuration backup/restore features or restricting their use to trusted administrators only. 7. Implement strict access controls and network-level protections such as VPNs or IP whitelisting for management interfaces. 8. Educate administrators on the risks of using default or weak credentials and the importance of timely patching.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-12-08T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69bc34d3e32a4fbe5fe2fca2

Added to database: 3/19/2026, 5:39:31 PM

Last enriched: 3/19/2026, 5:55:15 PM

Last updated: 3/20/2026, 5:16:46 AM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses