Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-67114: n/a

0
Unknown
VulnerabilityCVE-2025-67114cvecve-2025-67114
Published: Thu Mar 19 2026 (03/19/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

Use of a deterministic credential generation algorithm in /ftl/bin/calc_f2 in Small Cell Sercomm SCE4255W (FreedomFi Englewood) firmware before DG3934v3@2308041842 allows remote attackers to derive valid administrative/root credentials from the device's MAC address, enabling authentication bypass and full device access.

AI-Powered Analysis

AILast updated: 03/19/2026, 17:54:45 UTC

Technical Analysis

CVE-2025-67114 is a critical security vulnerability found in the Small Cell Sercomm SCE4255W (FreedomFi Englewood) firmware versions before DG3934v3@2308041842. The vulnerability arises from the use of a deterministic algorithm within the /ftl/bin/calc_f2 binary that generates administrative and root credentials based solely on the device's MAC address. Because MAC addresses are often publicly accessible or easily discoverable, an attacker can remotely compute valid credentials without any prior authentication or interaction with the device. This results in a complete authentication bypass, granting the attacker full administrative control over the device. Small cells like the SCE4255W are integral components in modern cellular networks, used to extend coverage and capacity, especially in 4G and 5G deployments. Compromise of such devices can lead to unauthorized network access, interception or manipulation of traffic, and disruption of cellular services. No patches or firmware updates are currently linked in the provided data, indicating that affected organizations must monitor vendor advisories closely. While no exploits are publicly known yet, the deterministic nature of the credential generation algorithm makes exploitation straightforward for attackers with knowledge of the MAC address. This vulnerability highlights the risks of weak credential generation mechanisms in embedded network devices and the importance of cryptographically secure methods for credential derivation.

Potential Impact

The impact of CVE-2025-67114 is severe for organizations deploying Small Cell Sercomm SCE4255W devices, particularly telecommunications providers and enterprises relying on cellular infrastructure. Successful exploitation allows attackers to bypass authentication and gain full administrative access, enabling them to alter device configurations, intercept or redirect network traffic, deploy malware, or cause denial of service. This can compromise the confidentiality, integrity, and availability of cellular communications. Given the role of small cells in extending network coverage and capacity, compromised devices could serve as entry points for broader network intrusions or surveillance. The vulnerability also poses risks to end-users relying on these networks for critical communications. Additionally, attackers could leverage compromised devices to launch attacks on other network components or pivot into enterprise networks. The lack of known exploits currently provides a window for mitigation, but the ease of exploitation and critical access level make this a high-priority threat globally.

Mitigation Recommendations

1. Immediate firmware upgrade: Organizations should promptly update affected devices to firmware version DG3934v3@2308041842 or later once available from the vendor to eliminate the deterministic credential generation flaw. 2. Network segmentation: Isolate small cell devices on dedicated network segments with strict access controls to limit exposure and lateral movement in case of compromise. 3. MAC address obfuscation: Where possible, restrict public exposure of device MAC addresses or implement MAC address randomization to reduce attacker knowledge. 4. Strong authentication: Implement additional authentication layers such as multi-factor authentication or certificate-based authentication for device management interfaces. 5. Monitoring and logging: Deploy continuous monitoring to detect unusual access patterns or configuration changes on small cell devices. 6. Incident response readiness: Prepare response plans for potential device compromise, including device replacement and forensic analysis. 7. Vendor engagement: Maintain close communication with the device vendor for patches, advisories, and recommended security practices. 8. Network-level protections: Use firewalls and intrusion detection/prevention systems to restrict management access to trusted sources only. These measures collectively reduce the risk of exploitation and limit potential damage.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-12-08T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69bc34d3e32a4fbe5fe2fcac

Added to database: 3/19/2026, 5:39:31 PM

Last enriched: 3/19/2026, 5:54:45 PM

Last updated: 3/20/2026, 5:17:05 AM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses