Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-9974: Vulnerability in Nokia Nokia ONT

0
High
VulnerabilityCVE-2025-9974cvecve-2025-9974
Published: Mon Feb 02 2026 (02/02/2026, 09:01:31 UTC)
Source: CVE Database V5
Vendor/Project: Nokia
Product: Nokia ONT

Description

The unified WEBUI application of the ONT/Beacon device contains an input handling flaw that allows authenticated users to trigger unintended system-level command execution. Due to insufficient validation of user-supplied data, a low-privileged authenticated attacker may be able to execute arbitrary commands on the underlying ONT/Beacon operating system, potentially impacting the confidentiality, integrity, and availability of the device.

AI-Powered Analysis

AILast updated: 02/02/2026, 09:29:40 UTC

Technical Analysis

CVE-2025-9974 is a security vulnerability identified in the unified WEBUI application of Nokia ONT/Beacon devices. The root cause is an input handling flaw that fails to properly validate user-supplied data, enabling an authenticated attacker with low privileges to execute arbitrary commands on the underlying operating system of the device. This type of vulnerability is typically classified as a command injection or improper input validation issue. The affected product is Nokia ONT, a device commonly used in optical network terminals for broadband access. The vulnerability affects all versions prior to release BBDR2503, which presumably contains the patch. Since exploitation requires only low-privileged authenticated access, an attacker who has gained minimal user credentials or access to the WEBUI interface can escalate their control to system-level command execution. This can lead to full compromise of the device, allowing attackers to manipulate device configurations, intercept or alter network traffic, disrupt service availability, or use the device as a foothold for further network attacks. No known public exploits have been reported yet, but the vulnerability's nature makes it a significant risk if weaponized. The lack of a CVSS score means severity must be assessed based on impact and exploitability factors. Given the device’s role in network infrastructure, successful exploitation could have cascading effects on network security and service continuity. The vulnerability was published in early 2026 and reserved in late 2025, indicating recent discovery and disclosure.

Potential Impact

For European organizations, especially telecom operators and ISPs deploying Nokia ONT devices, this vulnerability poses a serious threat. Compromise of ONT devices can lead to unauthorized access to subscriber data, interception or manipulation of broadband traffic, and disruption of internet services. This impacts confidentiality by exposing sensitive user and network data, integrity by allowing unauthorized configuration changes, and availability by potentially causing device or service outages. Given the critical role of ONT devices in last-mile broadband delivery, exploitation could degrade customer experience and damage organizational reputation. Additionally, compromised devices could be leveraged as entry points for lateral movement within enterprise or service provider networks, increasing the risk of broader cyberattacks. The absence of known exploits currently reduces immediate risk but does not eliminate the threat, especially if attackers develop weaponized code. European regulatory frameworks such as GDPR and NIS Directive heighten the importance of securing such infrastructure to avoid legal and compliance consequences.

Mitigation Recommendations

Organizations should prioritize upgrading all affected Nokia ONT devices to firmware version BBDR2503 or later, which addresses this vulnerability. Until patches are applied, restrict access to the WEBUI interface by implementing network segmentation and firewall rules to limit access only to trusted administrators. Enforce strong authentication mechanisms, including multi-factor authentication, to reduce the risk of credential compromise. Monitor device logs and network traffic for unusual activity indicative of exploitation attempts. Conduct regular security audits and vulnerability assessments on network infrastructure devices. Additionally, consider deploying intrusion detection/prevention systems (IDS/IPS) tuned to detect command injection patterns or anomalous WEBUI access. Establish incident response plans specific to network device compromise to enable rapid containment and remediation. Vendor coordination is essential to receive timely updates and security advisories. Finally, educate administrators on secure configuration and the risks of exposing management interfaces.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Nokia
Date Reserved
2025-09-04T10:51:51.347Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69806b1df9fa50a62f2c3c84

Added to database: 2/2/2026, 9:15:09 AM

Last enriched: 2/2/2026, 9:29:40 AM

Last updated: 2/7/2026, 1:35:29 AM

Views: 28

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats