NA

CVE-2023-25187

Published: 16/06/2023 Updated: 29/06/2023
CVSS v3 Base Score: 7 | Impact Score: 5.9 | Exploitability Score: 1
VMScore: 0

Vulnerability Summary

An issue exists on NOKIA Airscale ASIKA Single RAN devices prior to 21B. Nokia Single RAN commissioning procedures do not change (factory-time installed) default SSH public/private key values that are specific to a network operator. As a result, the CSP internal BTS network SSH server (disabled by default) continues to apply the default SSH public/private key values. These keys don't give access to BTS, because service user authentication is username/password-based on top of SSH. Nokia factory installed default SSH keys are meant to be changed from operator-specific values during the BTS deployment commissioning phase. However, before the 21B release, BTS commissioning manuals did not provide instructions to change default SSH keys (to BTS operator-specific values). This leads to a possibility for malicious operations staff (inside a CSP network) to attempt MITM exploitation of BTS service user access, during the moments that SSH is enabled for Nokia service personnel to perform troubleshooting activities.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

nokia asika_airscale_firmware 19b

nokia asika_airscale_firmware 20a

nokia asika_airscale_firmware 20b

nokia asika_airscale_firmware 20c

nokia asika_airscale_firmware 21a

Exploits

// Exploit Title: Nokia ASIKA 71352 - Hard-coded private key disclosure // Date: 2023-06-20 // Exploit Author: Amirhossein Bahramizadeh // Category : Hardware // Vendor Homepage: wwwnokiacom/about-us/security-and-privacy/product-security-advisory/cve-2023-25187/ // Version: 71352 (REQUIRED) // Tested on: Windows/Linux // CVE : CVE-202 ...
Nokia ASIKA version 71352 suffers from a hard-coded private key disclosure vulnerability ...