CVE-2025-24332 (GCVE-0-2025-24332)
Vulnerability from cvelistv5 – Published: 2025-07-02 08:31 – Updated: 2025-07-02 14:26
VLAI?
Summary
Nokia Single RAN AirScale baseband allows an authenticated administrative user access to all physical boards after performing a single login to the baseband system board. The baseband does not re-authenticate the user when they connect from the baseband system board to the baseband capacity boards using the internal bsoc SSH service, which is available only internally within the baseband and through the internal backplane between the boards. The bsoc SSH allows login from one board to another via the baseband internal backplane using an SSH private key present on the baseband system board.
This bsoc SSH capability was previously considered an administrative functionality but has now been restricted to be available only to baseband root-privileged administrators. This restriction mitigates the possibility of misuse with lower-level privileges (e.g., from baseband software images). This mitigation is included starting from release 23R4-SR 3.0 MP and later
Severity ?
7.1 (High)
CWE
- CWE-288 - Authentication Bypass Using an Alternate Path or Channel
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Nokia | Nokia Single RAN AirScale (Flexi Multiradio is not affected) |
Affected:
All the releases prior to 23R4-SR 3.0 MP
Unaffected: 23R4-SR 3.0 MP and later |
{
"containers": {
"adp": [
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2025-24332",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-07-02T14:26:05.156194Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-288",
"description": "CWE-288 Authentication Bypass Using an Alternate Path or Channel",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-07-02T14:26:54.520Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "Nokia Single RAN AirScale (Flexi Multiradio is not affected)",
"vendor": "Nokia",
"versions": [
{
"status": "affected",
"version": "All the releases prior to 23R4-SR 3.0 MP"
},
{
"status": "unaffected",
"version": "23R4-SR 3.0 MP and later"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Nokia Single RAN AirScale baseband allows an authenticated administrative user access to all physical boards after performing a single login to the baseband system board. The baseband does not re-authenticate the user when they connect from the baseband system board to the baseband capacity boards using the internal bsoc SSH service, which is available only internally within the baseband and through the internal backplane between the boards. The bsoc SSH allows login from one board to another via the baseband internal backplane using an SSH private key present on the baseband system board.\n\nThis bsoc SSH capability was previously considered an administrative functionality but has now been restricted to be available only to baseband root-privileged administrators. This restriction mitigates the possibility of misuse with lower-level privileges (e.g., from baseband software images). This mitigation is included starting from release 23R4-SR 3.0 MP and later"
}
],
"providerMetadata": {
"dateUpdated": "2025-07-02T08:31:38.820Z",
"orgId": "b48c3b8f-639e-4c16-8725-497bc411dad0",
"shortName": "Nokia"
},
"references": [
{
"name": "Nokia Security Advisory",
"url": "https://www.nokia.com/about-us/security-and-privacy/product-security-advisory/cve-2025-24332/"
}
],
"title": "Authenticated admin user can connect baseband internally from one board to another without needing to re-authentication",
"x_generator": {
"engine": "cveClient/1.0.15"
}
}
},
"cveMetadata": {
"assignerOrgId": "b48c3b8f-639e-4c16-8725-497bc411dad0",
"assignerShortName": "Nokia",
"cveId": "CVE-2025-24332",
"datePublished": "2025-07-02T08:31:38.820Z",
"dateReserved": "2025-01-20T05:33:25.524Z",
"dateUpdated": "2025-07-02T14:26:54.520Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2025-24332\",\"sourceIdentifier\":\"b48c3b8f-639e-4c16-8725-497bc411dad0\",\"published\":\"2025-07-02T09:15:24.703\",\"lastModified\":\"2025-07-03T15:13:53.147\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Nokia Single RAN AirScale baseband allows an authenticated administrative user access to all physical boards after performing a single login to the baseband system board. The baseband does not re-authenticate the user when they connect from the baseband system board to the baseband capacity boards using the internal bsoc SSH service, which is available only internally within the baseband and through the internal backplane between the boards. The bsoc SSH allows login from one board to another via the baseband internal backplane using an SSH private key present on the baseband system board.\\n\\nThis bsoc SSH capability was previously considered an administrative functionality but has now been restricted to be available only to baseband root-privileged administrators. This restriction mitigates the possibility of misuse with lower-level privileges (e.g., from baseband software images). This mitigation is included starting from release 23R4-SR 3.0 MP and later\"},{\"lang\":\"es\",\"value\":\"La banda base de Nokia Single RAN AirScale permite a un usuario administrativo autenticado acceder a todas las placas f\u00edsicas tras iniciar sesi\u00f3n una sola vez en la placa base. La banda base no reautentica al usuario cuando se conecta desde la placa base a las placas de capacidad mediante el servicio SSH interno bsoc, disponible \u00fanicamente dentro de la banda base y a trav\u00e9s del backplane interno entre las placas. El servicio SSH bsoc permite iniciar sesi\u00f3n de una placa a otra a trav\u00e9s del backplane interno de la banda base mediante una clave privada SSH presente en la placa base. Esta capacidad SSH bsoc se consideraba anteriormente una funcionalidad administrativa, pero ahora est\u00e1 restringida a administradores con privilegios root de banda base. Esta restricci\u00f3n mitiga la posibilidad de uso indebido con privilegios de nivel inferior (por ejemplo, desde im\u00e1genes de software de banda base). Esta mitigaci\u00f3n est\u00e1 incluida a partir de la versi\u00f3n 23R4-SR 3.0 MP y posteriores.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.1,\"baseSeverity\":\"HIGH\",\"attackVector\":\"ADJACENT_NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.2,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-288\"}]}],\"references\":[{\"url\":\"https://www.nokia.com/about-us/security-and-privacy/product-security-advisory/cve-2025-24332/\",\"source\":\"b48c3b8f-639e-4c16-8725-497bc411dad0\"}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 7.1, \"attackVector\": \"ADJACENT_NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"HIGH\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"HIGH\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-24332\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-07-02T14:26:05.156194Z\"}}}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-288\", \"description\": \"CWE-288 Authentication Bypass Using an Alternate Path or Channel\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-07-02T14:21:51.472Z\"}}], \"cna\": {\"title\": \"Authenticated admin user can connect baseband internally from one board to another without needing to re-authentication\", \"affected\": [{\"vendor\": \"Nokia\", \"product\": \"Nokia Single RAN AirScale (Flexi Multiradio is not affected)\", \"versions\": [{\"status\": \"affected\", \"version\": \"All the releases prior to 23R4-SR 3.0 MP\"}, {\"status\": \"unaffected\", \"version\": \"23R4-SR 3.0 MP and later\"}]}], \"references\": [{\"url\": \"https://www.nokia.com/about-us/security-and-privacy/product-security-advisory/cve-2025-24332/\", \"name\": \"Nokia Security Advisory\"}], \"x_generator\": {\"engine\": \"cveClient/1.0.15\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"Nokia Single RAN AirScale baseband allows an authenticated administrative user access to all physical boards after performing a single login to the baseband system board. The baseband does not re-authenticate the user when they connect from the baseband system board to the baseband capacity boards using the internal bsoc SSH service, which is available only internally within the baseband and through the internal backplane between the boards. The bsoc SSH allows login from one board to another via the baseband internal backplane using an SSH private key present on the baseband system board.\\n\\nThis bsoc SSH capability was previously considered an administrative functionality but has now been restricted to be available only to baseband root-privileged administrators. This restriction mitigates the possibility of misuse with lower-level privileges (e.g., from baseband software images). This mitigation is included starting from release 23R4-SR 3.0 MP and later\"}], \"providerMetadata\": {\"orgId\": \"b48c3b8f-639e-4c16-8725-497bc411dad0\", \"shortName\": \"Nokia\", \"dateUpdated\": \"2025-07-02T08:31:38.820Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2025-24332\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-07-02T14:26:54.520Z\", \"dateReserved\": \"2025-01-20T05:33:25.524Z\", \"assignerOrgId\": \"b48c3b8f-639e-4c16-8725-497bc411dad0\", \"datePublished\": \"2025-07-02T08:31:38.820Z\", \"assignerShortName\": \"Nokia\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…