Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2023-25187

Summary
Assigner-mitre
Assigner Org ID-8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At-16 Jun, 2023 | 00:00
Updated At-12 Dec, 2024 | 20:38
Rejected At-
Credits

An issue was discovered on NOKIA Airscale ASIKA Single RAN devices before 21B. Nokia Single RAN commissioning procedures do not change (factory-time installed) default SSH public/private key values that are specific to a network operator. As a result, the CSP internal BTS network SSH server (disabled by default) continues to apply the default SSH public/private key values. These keys don't give access to BTS, because service user authentication is username/password-based on top of SSH. Nokia factory installed default SSH keys are meant to be changed from operator-specific values during the BTS deployment commissioning phase. However, before the 21B release, BTS commissioning manuals did not provide instructions to change default SSH keys (to BTS operator-specific values). This leads to a possibility for malicious operations staff (inside a CSP network) to attempt MITM exploitation of BTS service user access, during the moments that SSH is enabled for Nokia service personnel to perform troubleshooting activities.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:mitre
Assigner Org ID:8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At:16 Jun, 2023 | 00:00
Updated At:12 Dec, 2024 | 20:38
Rejected At:
▼CVE Numbering Authority (CNA)

An issue was discovered on NOKIA Airscale ASIKA Single RAN devices before 21B. Nokia Single RAN commissioning procedures do not change (factory-time installed) default SSH public/private key values that are specific to a network operator. As a result, the CSP internal BTS network SSH server (disabled by default) continues to apply the default SSH public/private key values. These keys don't give access to BTS, because service user authentication is username/password-based on top of SSH. Nokia factory installed default SSH keys are meant to be changed from operator-specific values during the BTS deployment commissioning phase. However, before the 21B release, BTS commissioning manuals did not provide instructions to change default SSH keys (to BTS operator-specific values). This leads to a possibility for malicious operations staff (inside a CSP network) to attempt MITM exploitation of BTS service user access, during the moments that SSH is enabled for Nokia service personnel to perform troubleshooting activities.

Affected Products
Vendor
n/a
Product
n/a
Versions
Affected
  • n/a
Problem Types
TypeCWE IDDescription
textN/An/a
Type: text
CWE ID: N/A
Description: n/a
Metrics
VersionBase scoreBase severityVector
3.16.3MEDIUM
CVSS:3.1/AC:H/AV:L/A:H/C:H/I:H/PR:H/S:U/UI:R
Version: 3.1
Base score: 6.3
Base severity: MEDIUM
Vector:
CVSS:3.1/AC:H/AV:L/A:H/C:H/I:H/PR:H/S:U/UI:R
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://Nokia.com
N/A
https://www.nokia.com/about-us/security-and-privacy/product-security-advisory/cve-2023-25187/
N/A
http://packetstormsecurity.com/files/173055/Nokia-ASIKA-7.13.52-Private-Key-Disclosure.html
N/A
Hyperlink: https://Nokia.com
Resource: N/A
Hyperlink: https://www.nokia.com/about-us/security-and-privacy/product-security-advisory/cve-2023-25187/
Resource: N/A
Hyperlink: http://packetstormsecurity.com/files/173055/Nokia-ASIKA-7.13.52-Private-Key-Disclosure.html
Resource: N/A
▼Authorized Data Publishers (ADP)
1. CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://Nokia.com
x_transferred
https://www.nokia.com/about-us/security-and-privacy/product-security-advisory/cve-2023-25187/
x_transferred
http://packetstormsecurity.com/files/173055/Nokia-ASIKA-7.13.52-Private-Key-Disclosure.html
x_transferred
Hyperlink: https://Nokia.com
Resource:
x_transferred
Hyperlink: https://www.nokia.com/about-us/security-and-privacy/product-security-advisory/cve-2023-25187/
Resource:
x_transferred
Hyperlink: http://packetstormsecurity.com/files/173055/Nokia-ASIKA-7.13.52-Private-Key-Disclosure.html
Resource:
x_transferred
2. CISA ADP Vulnrichment
Affected Products
Problem Types
TypeCWE IDDescription
CWECWE-798CWE-798 Use of Hard-coded Credentials
Type: CWE
CWE ID: CWE-798
Description: CWE-798 Use of Hard-coded Credentials
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:cve@mitre.org
Published At:16 Jun, 2023 | 20:15
Updated At:12 Dec, 2024 | 21:15

An issue was discovered on NOKIA Airscale ASIKA Single RAN devices before 21B. Nokia Single RAN commissioning procedures do not change (factory-time installed) default SSH public/private key values that are specific to a network operator. As a result, the CSP internal BTS network SSH server (disabled by default) continues to apply the default SSH public/private key values. These keys don't give access to BTS, because service user authentication is username/password-based on top of SSH. Nokia factory installed default SSH keys are meant to be changed from operator-specific values during the BTS deployment commissioning phase. However, before the 21B release, BTS commissioning manuals did not provide instructions to change default SSH keys (to BTS operator-specific values). This leads to a possibility for malicious operations staff (inside a CSP network) to attempt MITM exploitation of BTS service user access, during the moments that SSH is enabled for Nokia service personnel to perform troubleshooting activities.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary3.16.3MEDIUM
CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H
Primary3.17.0HIGH
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Type: Secondary
Version: 3.1
Base score: 6.3
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H
Type: Primary
Version: 3.1
Base score: 7.0
Base severity: HIGH
Vector:
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
CPE Matches

Nokia Corporation
nokia
>>asika_airscale_firmware>>19b
cpe:2.3:o:nokia:asika_airscale_firmware:19b:*:*:*:*:*:*:*
Nokia Corporation
nokia
>>asika_airscale_firmware>>20a
cpe:2.3:o:nokia:asika_airscale_firmware:20a:*:*:*:*:*:*:*
Nokia Corporation
nokia
>>asika_airscale_firmware>>20b
cpe:2.3:o:nokia:asika_airscale_firmware:20b:*:*:*:*:*:*:*
Nokia Corporation
nokia
>>asika_airscale_firmware>>20c
cpe:2.3:o:nokia:asika_airscale_firmware:20c:*:*:*:*:*:*:*
Nokia Corporation
nokia
>>asika_airscale_firmware>>21a
cpe:2.3:o:nokia:asika_airscale_firmware:21a:*:*:*:*:*:*:*
Nokia Corporation
nokia
>>asika_airscale>>-
cpe:2.3:h:nokia:asika_airscale:-:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-798Primarynvd@nist.gov
CWE-798Secondary134c704f-9b21-4f2e-91b3-4a467353bcc0
CWE ID: CWE-798
Type: Primary
Source: nvd@nist.gov
CWE ID: CWE-798
Type: Secondary
Source: 134c704f-9b21-4f2e-91b3-4a467353bcc0
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://packetstormsecurity.com/files/173055/Nokia-ASIKA-7.13.52-Private-Key-Disclosure.htmlcve@mitre.org
Exploit
Third Party Advisory
VDB Entry
https://Nokia.comcve@mitre.org
Product
https://www.nokia.com/about-us/security-and-privacy/product-security-advisory/cve-2023-25187/cve@mitre.org
Vendor Advisory
http://packetstormsecurity.com/files/173055/Nokia-ASIKA-7.13.52-Private-Key-Disclosure.htmlaf854a3a-2127-422b-91ae-364da2661108
Exploit
Third Party Advisory
VDB Entry
https://Nokia.comaf854a3a-2127-422b-91ae-364da2661108
Product
https://www.nokia.com/about-us/security-and-privacy/product-security-advisory/cve-2023-25187/af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
Hyperlink: http://packetstormsecurity.com/files/173055/Nokia-ASIKA-7.13.52-Private-Key-Disclosure.html
Source: cve@mitre.org
Resource:
Exploit
Third Party Advisory
VDB Entry
Hyperlink: https://Nokia.com
Source: cve@mitre.org
Resource:
Product
Hyperlink: https://www.nokia.com/about-us/security-and-privacy/product-security-advisory/cve-2023-25187/
Source: cve@mitre.org
Resource:
Vendor Advisory
Hyperlink: http://packetstormsecurity.com/files/173055/Nokia-ASIKA-7.13.52-Private-Key-Disclosure.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Exploit
Third Party Advisory
VDB Entry
Hyperlink: https://Nokia.com
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Product
Hyperlink: https://www.nokia.com/about-us/security-and-privacy/product-security-advisory/cve-2023-25187/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Vendor Advisory

Change History

0
Information is not available yet

Similar CVEs

7Records found

CVE-2023-26062
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7||HIGH
EPSS-0.06% / 18.22%
||
7 Day CHG~0.00%
Published-14 Jun, 2023 | 00:00
Updated-06 Jan, 2025 | 16:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A mobile network solution internal fault is found in Nokia Web Element Manager before 22 R1, in which an authenticated, unprivileged user can execute administrative functions. Exploitation is not possible from outside of mobile network solution architecture. This means that exploit is not possible from mobile network user UEs, from roaming networks, or from the Internet. Exploitation is possible only from a CSP (Communication Service Provider) mobile network solution internal BTS management network.

Action-Not Available
Vendor-n/aNokia Corporation
Product-web_element_managern/a
CWE ID-CWE-269
Improper Privilege Management
CVE-2024-28812
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-8.8||HIGH
EPSS-0.06% / 19.09%
||
7 Day CHG~0.00%
Published-30 Sep, 2024 | 00:00
Updated-30 May, 2025 | 14:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in Infinera hiT 7300 5.60.50. A hidden SSH service (on the local management network interface) with hardcoded credentials allows attackers to access the appliance operating system (with highest privileges) via an SSH connection.

Action-Not Available
Vendor-n/ainfineraNokia Corporation
Product-hit_7300_firmwarehit_7300n/ahit_7300
CWE ID-CWE-798
Use of Hard-coded Credentials
CVE-2024-28809
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-8.8||HIGH
EPSS-0.04% / 8.86%
||
7 Day CHG~0.00%
Published-30 Sep, 2024 | 00:00
Updated-30 May, 2025 | 14:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in Infinera hiT 7300 5.60.50. Cleartext storage of sensitive password in firmware update packages allows attackers to access various appliance services via hardcoded credentials.

Action-Not Available
Vendor-n/ainfineraNokia Corporation
Product-hit_7300_firmwarehit_7300n/ahit_7300
CWE ID-CWE-312
Cleartext Storage of Sensitive Information
CWE ID-CWE-798
Use of Hard-coded Credentials
CVE-2022-36222
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-8.4||HIGH
EPSS-0.03% / 8.11%
||
7 Day CHG~0.00%
Published-21 Dec, 2022 | 00:00
Updated-16 Apr, 2025 | 18:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Nokia Fastmile 3tg00118abad52 devices shipped by Optus are shipped with a default hardcoded admin account of admin:Nq+L5st7o This account can be used locally to access the web admin interface.

Action-Not Available
Vendor-n/aNokia Corporation
Product-fastmile_firmwarefastmilen/a
CWE ID-CWE-798
Use of Hard-coded Credentials
CVE-2019-3918
Matching Score-6
Assigner-Tenable Network Security, Inc.
ShareView Details
Matching Score-6
Assigner-Tenable Network Security, Inc.
CVSS Score-9.8||CRITICAL
EPSS-0.35% / 56.44%
||
7 Day CHG~0.00%
Published-05 Mar, 2019 | 21:00
Updated-16 Sep, 2024 | 22:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Alcatel Lucent I-240W-Q GPON ONT using firmware version 3FE54567BOZJ19 contains multiple hard coded credentials for the Telnet and SSH interfaces.

Action-Not Available
Vendor-Tenable, Inc.Nokia Corporation
Product-i-240w-q_gpon_ont_firmwarei-240w-q_gpon_ontAlcatel Lucent I-240W-Q GPON ONT
CWE ID-CWE-798
Use of Hard-coded Credentials
CVE-2022-22766
Matching Score-4
Assigner-Becton, Dickinson and Company (BD)
ShareView Details
Matching Score-4
Assigner-Becton, Dickinson and Company (BD)
CVSS Score-7||HIGH
EPSS-0.05% / 14.56%
||
7 Day CHG~0.00%
Published-11 Feb, 2022 | 18:12
Updated-16 Sep, 2024 | 19:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
BD Pyxis Products - Hardcoded Credentials

Hardcoded credentials are used in specific BD Pyxis products. If exploited, threat actors may be able to gain access to the underlying file system and could potentially exploit application files for information that could be used to decrypt application credentials or gain access to electronic protected health information (ePHI) or other sensitive information.

Action-Not Available
Vendor-Becton, Dickinson and Company
Product-pyxis_anesthesia_station_es_firmwarepyxis_kanban_rfpyxis_medstation_4000_firmwarepyxis_procedurestationpyxis_medstation_es_server_firmwarepyxis_supplycenterpyxis_anesthesia_station_esrowa_pouch_packaging_systems_firmwarepyxis_iv_prep_firmwarepyxis_ciisafepyxis_track_and_deliver_firmwarepyxis_supplycenter_firmwarepyxis_procedurestation_firmwarepyxis_medstation_es_firmwarepyxis_anesthesia_station_4000_firmwarepyxis_rapid_rxpyxis_med_link_family_firmwarepyxis_medbankpyxis_pharmopack_firmwarepyxis_rapid_rx_firmwarepyxis_ciisafe_firmwarepyxis_parassistpyxis_inventory_connect_firmwarepyxis_track_and_deliverpyxis_cato_firmwarepyxis_medstation_4000pyxis_kanban_rf_firmwarepyxis_stockstation_firmwarepyxis_logisticspyxis_med_link_familypyxis_catopyxis_iv_preppyxis_jitrbud_firmwarepyxis_medbank_firmwarepyxis_medstation_espyxis_stockstationpyxis_supplyrollerrowa_pouch_packaging_systemspyxis_pharmopackpyxis_supplyroller_firmwarepyxis_supplystationpyxis_anesthesia_station_4000pyxis_logistics_firmwarepyxis_parassist_firmwarepyxis_supplystation_firmwarepyxis_medstation_es_serverpyxis_jitrbudpyxis_inventory_connectBD Pyxis StockStationBD Pyxis PharmoPackBD Pyxis Med Link FamilyBD Pyxis SupplyRollerBD Pyxis CIISafeBD Pyxis SupplyCenterBD Pyxis CATOBD Pyxis MedStation 4000BD Pyxis JITrBUDBD Pyxis SupplyStation (including RF, EC, CP)BD Rowa Pouch Packaging SystemsBD Pyxis KanBan RFBD Pyxis ParAssistBD Pyxis LogisticsBD Pyxis MedBankBD Pyxis Anesthesia Station ESBD Pyxis ProcedureStation (including EC)BD Pyxis Inventory ConnectBD Pyxis IV PrepBD Pyxis Anesthesia Station 4000BD Pyxis MedStation ESBD Pyxis MedStation ES ServerBD Pyxis Rapid RxBD Pyxis Track and Deliver
CWE ID-CWE-798
Use of Hard-coded Credentials
CVE-2025-9309
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-2||LOW
EPSS-0.01% / 1.74%
||
7 Day CHG~0.00%
Published-21 Aug, 2025 | 16:32
Updated-25 Aug, 2025 | 02:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Tenda AC10 MD5 Hash shadow hard-coded credentials

A vulnerability was found in Tenda AC10 16.03.10.13. Affected is an unknown function of the file /etc_ro/shadow of the component MD5 Hash Handler. Performing manipulation results in hard-coded credentials. The attack needs to be approached locally. A high degree of complexity is needed for the attack. The exploitability is told to be difficult. The exploit has been made public and could be used.

Action-Not Available
Vendor-Tenda Technology Co., Ltd.
Product-ac10ac10_firmwareAC10
CWE ID-CWE-259
Use of Hard-coded Password
CWE ID-CWE-798
Use of Hard-coded Credentials
Details not found