CVE-2025-9974: Vulnerability in Nokia Nokia ONT
The unified WEBUI application of the ONT/Beacon device contains an input handling flaw that allows authenticated users to trigger unintended system-level command execution. Due to insufficient validation of user-supplied data, a low-privileged authenticated attacker may be able to execute arbitrary commands on the underlying ONT/Beacon operating system, potentially impacting the confidentiality, integrity, and availability of the device.
AI Analysis
Technical Summary
CVE-2025-9974 is a security vulnerability identified in the unified WEBUI application of Nokia ONT/Beacon devices. The root cause is an input handling flaw that fails to properly validate user-supplied data, enabling an authenticated attacker with low privileges to execute arbitrary commands on the underlying operating system of the device. This type of vulnerability is typically classified as a command injection or improper input validation issue. The affected product is Nokia ONT, a device commonly used in optical network terminals for broadband access. The vulnerability affects all versions prior to release BBDR2503, which presumably contains the patch. Since exploitation requires only low-privileged authenticated access, an attacker who has gained minimal user credentials or access to the WEBUI interface can escalate their control to system-level command execution. This can lead to full compromise of the device, allowing attackers to manipulate device configurations, intercept or alter network traffic, disrupt service availability, or use the device as a foothold for further network attacks. No known public exploits have been reported yet, but the vulnerability's nature makes it a significant risk if weaponized. The lack of a CVSS score means severity must be assessed based on impact and exploitability factors. Given the device’s role in network infrastructure, successful exploitation could have cascading effects on network security and service continuity. The vulnerability was published in early 2026 and reserved in late 2025, indicating recent discovery and disclosure.
Potential Impact
For European organizations, especially telecom operators and ISPs deploying Nokia ONT devices, this vulnerability poses a serious threat. Compromise of ONT devices can lead to unauthorized access to subscriber data, interception or manipulation of broadband traffic, and disruption of internet services. This impacts confidentiality by exposing sensitive user and network data, integrity by allowing unauthorized configuration changes, and availability by potentially causing device or service outages. Given the critical role of ONT devices in last-mile broadband delivery, exploitation could degrade customer experience and damage organizational reputation. Additionally, compromised devices could be leveraged as entry points for lateral movement within enterprise or service provider networks, increasing the risk of broader cyberattacks. The absence of known exploits currently reduces immediate risk but does not eliminate the threat, especially if attackers develop weaponized code. European regulatory frameworks such as GDPR and NIS Directive heighten the importance of securing such infrastructure to avoid legal and compliance consequences.
Mitigation Recommendations
Organizations should prioritize upgrading all affected Nokia ONT devices to firmware version BBDR2503 or later, which addresses this vulnerability. Until patches are applied, restrict access to the WEBUI interface by implementing network segmentation and firewall rules to limit access only to trusted administrators. Enforce strong authentication mechanisms, including multi-factor authentication, to reduce the risk of credential compromise. Monitor device logs and network traffic for unusual activity indicative of exploitation attempts. Conduct regular security audits and vulnerability assessments on network infrastructure devices. Additionally, consider deploying intrusion detection/prevention systems (IDS/IPS) tuned to detect command injection patterns or anomalous WEBUI access. Establish incident response plans specific to network device compromise to enable rapid containment and remediation. Vendor coordination is essential to receive timely updates and security advisories. Finally, educate administrators on secure configuration and the risks of exposing management interfaces.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden, Finland
CVE-2025-9974: Vulnerability in Nokia Nokia ONT
Description
The unified WEBUI application of the ONT/Beacon device contains an input handling flaw that allows authenticated users to trigger unintended system-level command execution. Due to insufficient validation of user-supplied data, a low-privileged authenticated attacker may be able to execute arbitrary commands on the underlying ONT/Beacon operating system, potentially impacting the confidentiality, integrity, and availability of the device.
AI-Powered Analysis
Technical Analysis
CVE-2025-9974 is a security vulnerability identified in the unified WEBUI application of Nokia ONT/Beacon devices. The root cause is an input handling flaw that fails to properly validate user-supplied data, enabling an authenticated attacker with low privileges to execute arbitrary commands on the underlying operating system of the device. This type of vulnerability is typically classified as a command injection or improper input validation issue. The affected product is Nokia ONT, a device commonly used in optical network terminals for broadband access. The vulnerability affects all versions prior to release BBDR2503, which presumably contains the patch. Since exploitation requires only low-privileged authenticated access, an attacker who has gained minimal user credentials or access to the WEBUI interface can escalate their control to system-level command execution. This can lead to full compromise of the device, allowing attackers to manipulate device configurations, intercept or alter network traffic, disrupt service availability, or use the device as a foothold for further network attacks. No known public exploits have been reported yet, but the vulnerability's nature makes it a significant risk if weaponized. The lack of a CVSS score means severity must be assessed based on impact and exploitability factors. Given the device’s role in network infrastructure, successful exploitation could have cascading effects on network security and service continuity. The vulnerability was published in early 2026 and reserved in late 2025, indicating recent discovery and disclosure.
Potential Impact
For European organizations, especially telecom operators and ISPs deploying Nokia ONT devices, this vulnerability poses a serious threat. Compromise of ONT devices can lead to unauthorized access to subscriber data, interception or manipulation of broadband traffic, and disruption of internet services. This impacts confidentiality by exposing sensitive user and network data, integrity by allowing unauthorized configuration changes, and availability by potentially causing device or service outages. Given the critical role of ONT devices in last-mile broadband delivery, exploitation could degrade customer experience and damage organizational reputation. Additionally, compromised devices could be leveraged as entry points for lateral movement within enterprise or service provider networks, increasing the risk of broader cyberattacks. The absence of known exploits currently reduces immediate risk but does not eliminate the threat, especially if attackers develop weaponized code. European regulatory frameworks such as GDPR and NIS Directive heighten the importance of securing such infrastructure to avoid legal and compliance consequences.
Mitigation Recommendations
Organizations should prioritize upgrading all affected Nokia ONT devices to firmware version BBDR2503 or later, which addresses this vulnerability. Until patches are applied, restrict access to the WEBUI interface by implementing network segmentation and firewall rules to limit access only to trusted administrators. Enforce strong authentication mechanisms, including multi-factor authentication, to reduce the risk of credential compromise. Monitor device logs and network traffic for unusual activity indicative of exploitation attempts. Conduct regular security audits and vulnerability assessments on network infrastructure devices. Additionally, consider deploying intrusion detection/prevention systems (IDS/IPS) tuned to detect command injection patterns or anomalous WEBUI access. Establish incident response plans specific to network device compromise to enable rapid containment and remediation. Vendor coordination is essential to receive timely updates and security advisories. Finally, educate administrators on secure configuration and the risks of exposing management interfaces.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Nokia
- Date Reserved
- 2025-09-04T10:51:51.347Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 69806b1df9fa50a62f2c3c84
Added to database: 2/2/2026, 9:15:09 AM
Last enriched: 2/2/2026, 9:29:40 AM
Last updated: 2/7/2026, 1:35:29 AM
Views: 28
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2071: Buffer Overflow in UTT 进取 520W
HighCVE-2026-25762: CWE-400: Uncontrolled Resource Consumption in adonisjs core
HighCVE-2026-25754: CWE-1321: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') in adonisjs core
HighCVE-2026-25644: CWE-295: Improper Certificate Validation in datahub-project datahub
HighCVE-2026-25804: CWE-287: Improper Authentication in antrea-io antrea
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.