Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-7635: CWE-306 Missing Authentication for Critical Function in Calix GigaCenter ONT

0
High
VulnerabilityCVE-2025-7635cvecve-2025-7635cwe-306
Published: Tue Sep 09 2025 (09/09/2025, 20:08:37 UTC)
Source: CVE Database V5
Vendor/Project: Calix
Product: GigaCenter ONT

Description

Unauthenticated Telnet access vulnerability in Calix GigaCenter ONT allows root access.This issue affects GigaCenter ONT: 844E, 844G, 844GE, 854GE.

AI-Powered Analysis

AILast updated: 09/17/2025, 00:43:20 UTC

Technical Analysis

CVE-2025-7635 is a high-severity vulnerability affecting Calix GigaCenter Optical Network Terminals (ONTs), specifically models 844E, 844G, 844GE, and 854GE. The vulnerability is classified under CWE-306, which indicates missing authentication for a critical function. In this case, the critical function is Telnet access to the device. Due to the lack of authentication, an attacker can gain unauthenticated root-level access to the affected ONTs via Telnet. This means that an attacker within the network range of the device can connect to the Telnet service without credentials and obtain full administrative control over the device. The CVSS 4.0 base score is 8.7 (high), reflecting the ease of exploitation (no authentication or user interaction required), the network attack vector (adjacent network), and the critical impact on confidentiality, integrity, and availability (all rated high). The vulnerability does not require privileges or user interaction, making it particularly dangerous. Although no known exploits are currently reported in the wild, the vulnerability's nature and severity make it a prime target for attackers once exploit code becomes available. The lack of authentication on a critical management interface like Telnet can allow attackers to manipulate device configurations, intercept or redirect network traffic, deploy malware, or cause denial of service. The absence of published patches at this time increases the urgency for mitigation.

Potential Impact

For European organizations, the impact of this vulnerability can be significant, especially for ISPs, telecom providers, and enterprises using Calix GigaCenter ONTs for broadband access. Compromise of ONTs can lead to unauthorized network access, interception of sensitive communications, and disruption of internet services. This can affect both residential and business customers, potentially causing widespread service outages and data breaches. Given the root-level access, attackers could also pivot into internal networks, compromising additional systems. The vulnerability undermines the trust in broadband infrastructure and can have regulatory implications under GDPR if personal data is exposed. Critical infrastructure operators relying on these devices may face operational risks and reputational damage. The high severity and ease of exploitation increase the likelihood of targeted attacks or opportunistic exploitation in Europe.

Mitigation Recommendations

1. Immediate network segmentation: Isolate affected ONTs from untrusted networks and restrict Telnet access to trusted management networks only. 2. Disable Telnet service on the affected devices if possible, or block Telnet ports (typically TCP 23) at the network perimeter. 3. Monitor network traffic for unusual Telnet connection attempts or unauthorized access patterns. 4. Implement strict access control lists (ACLs) on routers and switches to limit access to ONT management interfaces. 5. Engage with Calix support and monitor for official patches or firmware updates addressing this vulnerability; apply updates promptly once available. 6. Consider replacing vulnerable ONT models with devices that have secure management interfaces supporting authentication and encrypted protocols like SSH. 7. Conduct regular security audits and penetration testing focusing on network edge devices to detect similar vulnerabilities. 8. Educate network operations teams about the risks of unauthenticated management interfaces and enforce strong security policies.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Fluid Attacks
Date Reserved
2025-07-14T12:49:39.283Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68c089dc075fc5f733c91a3d

Added to database: 9/9/2025, 8:11:08 PM

Last enriched: 9/17/2025, 12:43:20 AM

Last updated: 10/29/2025, 9:41:08 AM

Views: 62

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats