CVE-2025-24331
Awaiting Analysis Awaiting Analysis - Queue
BaseFortify

Publication date: 2025-07-02

Last updated on: 2025-07-03

Assigner: Nokia

Description
The Single RAN baseband OAM service is intended to run as an unprivileged service. However, it initially starts with root privileges and assigns certain capabilities before dropping to an unprivileged level. The capabilities retained from the root period are considered extensive after the privilege drop and, in theory, could potentially allow actions beyond the intended scope of the OAM service. These actions could include gaining root privileges, accessing root-owned files, modifying them as the file owner, and then returning them to root ownership. This issue has been corrected starting from release 24R1-SR 0.2 MP and later. Beginning with release 24R1-SR 0.2 MP, the OAM service software capabilities are restricted to the minimum necessary.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-07-02
Last Modified
2025-07-03
Generated
2026-05-06
AI Q&A
2025-07-02
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Currently, no data is known.
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-250 The product performs an operation at a privilege level that is higher than the minimum level required, which creates new weaknesses or amplifies the consequences of other weaknesses.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

The vulnerability involves the Single RAN baseband OAM service, which is supposed to run as an unprivileged service. However, it initially starts with root privileges and retains extensive capabilities even after dropping to an unprivileged level. These retained capabilities could allow the service to perform actions beyond its intended scope, such as gaining root privileges, accessing and modifying root-owned files, and then restoring their ownership to root.


How can this vulnerability impact me? :

This vulnerability could allow an attacker or a malicious process to escalate privileges to root, access sensitive root-owned files, and modify them. This could lead to unauthorized control over the system, data tampering, and potential compromise of system integrity and security.


What immediate steps should I take to mitigate this vulnerability?

Upgrade the Single RAN baseband OAM service to release 24R1-SR 0.2 MP or later, where the issue has been corrected by restricting the OAM service software capabilities to the minimum necessary.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart