CVE-2025-24332
Awaiting Analysis Awaiting Analysis - Queue
BaseFortify

Publication date: 2025-07-02

Last updated on: 2025-07-03

Assigner: Nokia

Description
Nokia Single RAN AirScale baseband allows an authenticated administrative user access to all physical boards after performing a single login to the baseband system board. The baseband does not re-authenticate the user when they connect from the baseband system board to the baseband capacity boards using the internal bsoc SSH service, which is available only internally within the baseband and through the internal backplane between the boards. The bsoc SSH allows login from one board to another via the baseband internal backplane using an SSH private key present on the baseband system board. This bsoc SSH capability was previously considered an administrative functionality but has now been restricted to be available only to baseband root-privileged administrators. This restriction mitigates the possibility of misuse with lower-level privileges (e.g., from baseband software images). This mitigation is included starting from release 23R4-SR 3.0 MP and later
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-07-02
Last Modified
2025-07-03
Generated
2026-05-07
AI Q&A
2025-07-02
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Currently, no data is known.
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-288 The product requires authentication, but the product has an alternate path or channel that does not require authentication.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability involves the Nokia Single RAN AirScale baseband system where an authenticated administrative user can access all physical boards after a single login to the baseband system board. The system does not require re-authentication when the user connects from the system board to other baseband capacity boards via an internal SSH service (bsoc SSH) that uses a private key stored on the system board. This allows potentially broader access within the baseband without additional authentication steps. The vulnerability has been mitigated by restricting this SSH access to only root-privileged administrators starting from release 23R4-SR 3.0 MP and later.


How can this vulnerability impact me? :

The vulnerability could allow an authenticated administrative user to move laterally within the baseband system without re-authentication, potentially accessing all physical boards. This could lead to unauthorized access or misuse of system resources if lower-privileged users gain administrative access initially. The risk is mitigated in newer releases by restricting the internal SSH access to root-privileged administrators only.


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, ensure that only baseband root-privileged administrators have access to the bsoc SSH service. Upgrade your Nokia Single RAN AirScale baseband system to release 23R4-SR 3.0 MP or later, where this restriction is enforced to prevent misuse by lower-level privileges.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart