CVE-2025-7635: CWE-306 Missing Authentication for Critical Function in Calix GigaCenter ONT
Unauthenticated Telnet access vulnerability in Calix GigaCenter ONT allows root access.This issue affects GigaCenter ONT: 844E, 844G, 844GE, 854GE.
AI Analysis
Technical Summary
CVE-2025-7635 is a high-severity vulnerability affecting Calix GigaCenter Optical Network Terminals (ONTs), specifically models 844E, 844G, 844GE, and 854GE. The vulnerability is classified under CWE-306, which indicates missing authentication for a critical function. In this case, the critical function is Telnet access to the device. Due to the lack of authentication, an attacker can gain unauthenticated root-level access to the affected ONTs via Telnet. This means that an attacker within the network range of the device can connect to the Telnet service without credentials and obtain full administrative control over the device. The CVSS 4.0 base score is 8.7 (high), reflecting the ease of exploitation (no authentication or user interaction required), the network attack vector (adjacent network), and the critical impact on confidentiality, integrity, and availability (all rated high). The vulnerability does not require privileges or user interaction, making it particularly dangerous. Although no known exploits are currently reported in the wild, the vulnerability's nature and severity make it a prime target for attackers once exploit code becomes available. The lack of authentication on a critical management interface like Telnet can allow attackers to manipulate device configurations, intercept or redirect network traffic, deploy malware, or cause denial of service. The absence of published patches at this time increases the urgency for mitigation.
Potential Impact
For European organizations, the impact of this vulnerability can be significant, especially for ISPs, telecom providers, and enterprises using Calix GigaCenter ONTs for broadband access. Compromise of ONTs can lead to unauthorized network access, interception of sensitive communications, and disruption of internet services. This can affect both residential and business customers, potentially causing widespread service outages and data breaches. Given the root-level access, attackers could also pivot into internal networks, compromising additional systems. The vulnerability undermines the trust in broadband infrastructure and can have regulatory implications under GDPR if personal data is exposed. Critical infrastructure operators relying on these devices may face operational risks and reputational damage. The high severity and ease of exploitation increase the likelihood of targeted attacks or opportunistic exploitation in Europe.
Mitigation Recommendations
1. Immediate network segmentation: Isolate affected ONTs from untrusted networks and restrict Telnet access to trusted management networks only. 2. Disable Telnet service on the affected devices if possible, or block Telnet ports (typically TCP 23) at the network perimeter. 3. Monitor network traffic for unusual Telnet connection attempts or unauthorized access patterns. 4. Implement strict access control lists (ACLs) on routers and switches to limit access to ONT management interfaces. 5. Engage with Calix support and monitor for official patches or firmware updates addressing this vulnerability; apply updates promptly once available. 6. Consider replacing vulnerable ONT models with devices that have secure management interfaces supporting authentication and encrypted protocols like SSH. 7. Conduct regular security audits and penetration testing focusing on network edge devices to detect similar vulnerabilities. 8. Educate network operations teams about the risks of unauthenticated management interfaces and enforce strong security policies.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden, Poland, Austria
CVE-2025-7635: CWE-306 Missing Authentication for Critical Function in Calix GigaCenter ONT
Description
Unauthenticated Telnet access vulnerability in Calix GigaCenter ONT allows root access.This issue affects GigaCenter ONT: 844E, 844G, 844GE, 854GE.
AI-Powered Analysis
Technical Analysis
CVE-2025-7635 is a high-severity vulnerability affecting Calix GigaCenter Optical Network Terminals (ONTs), specifically models 844E, 844G, 844GE, and 854GE. The vulnerability is classified under CWE-306, which indicates missing authentication for a critical function. In this case, the critical function is Telnet access to the device. Due to the lack of authentication, an attacker can gain unauthenticated root-level access to the affected ONTs via Telnet. This means that an attacker within the network range of the device can connect to the Telnet service without credentials and obtain full administrative control over the device. The CVSS 4.0 base score is 8.7 (high), reflecting the ease of exploitation (no authentication or user interaction required), the network attack vector (adjacent network), and the critical impact on confidentiality, integrity, and availability (all rated high). The vulnerability does not require privileges or user interaction, making it particularly dangerous. Although no known exploits are currently reported in the wild, the vulnerability's nature and severity make it a prime target for attackers once exploit code becomes available. The lack of authentication on a critical management interface like Telnet can allow attackers to manipulate device configurations, intercept or redirect network traffic, deploy malware, or cause denial of service. The absence of published patches at this time increases the urgency for mitigation.
Potential Impact
For European organizations, the impact of this vulnerability can be significant, especially for ISPs, telecom providers, and enterprises using Calix GigaCenter ONTs for broadband access. Compromise of ONTs can lead to unauthorized network access, interception of sensitive communications, and disruption of internet services. This can affect both residential and business customers, potentially causing widespread service outages and data breaches. Given the root-level access, attackers could also pivot into internal networks, compromising additional systems. The vulnerability undermines the trust in broadband infrastructure and can have regulatory implications under GDPR if personal data is exposed. Critical infrastructure operators relying on these devices may face operational risks and reputational damage. The high severity and ease of exploitation increase the likelihood of targeted attacks or opportunistic exploitation in Europe.
Mitigation Recommendations
1. Immediate network segmentation: Isolate affected ONTs from untrusted networks and restrict Telnet access to trusted management networks only. 2. Disable Telnet service on the affected devices if possible, or block Telnet ports (typically TCP 23) at the network perimeter. 3. Monitor network traffic for unusual Telnet connection attempts or unauthorized access patterns. 4. Implement strict access control lists (ACLs) on routers and switches to limit access to ONT management interfaces. 5. Engage with Calix support and monitor for official patches or firmware updates addressing this vulnerability; apply updates promptly once available. 6. Consider replacing vulnerable ONT models with devices that have secure management interfaces supporting authentication and encrypted protocols like SSH. 7. Conduct regular security audits and penetration testing focusing on network edge devices to detect similar vulnerabilities. 8. Educate network operations teams about the risks of unauthenticated management interfaces and enforce strong security policies.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Fluid Attacks
- Date Reserved
- 2025-07-14T12:49:39.283Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68c089dc075fc5f733c91a3d
Added to database: 9/9/2025, 8:11:08 PM
Last enriched: 9/17/2025, 12:43:20 AM
Last updated: 10/29/2025, 9:41:08 AM
Views: 62
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.