CVE-2025-0355
Published: 15 January 2025
Summary
CVE-2025-0355 is a high-severity Missing Authentication for Critical Function (CWE-306) vulnerability in Nec (inferred from references). Its CVSS base score is 7.5 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 38.3th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 AC-14 (Permitted Actions Without Identification or Authentication) and AC-3 (Access Enforcement).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
AC-14 directly restricts permitted actions without identification or authentication, preventing exposure of critical functions like Wi-Fi password retrieval.
SC-14 protects sensitive information at publicly accessible unauthenticated interfaces, directly mitigating network-based retrieval of the Wi-Fi password.
AC-3 enforces approved access authorizations, ensuring authentication is required for sensitive configuration data like Wi-Fi passwords.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Missing authentication on a network-exposed critical function in routers directly enables remote unauthenticated retrieval of Wi-Fi credentials via exploitation of the public-facing device interface.
NVD Description
Missing Authentication for Critical Function vulnerability in NEC Corporation Aterm WG2600HS Ver.1.7.2 and earlier, WF1200CRS Ver.1.6.0 and earlier, WG1200CRS Ver.1.5.0 and earlier, GB1200PE Ver.1.3.0 and earlier, WG2600HP4 Ver.1.4.2 and earlier, WG2600HM4 Ver.1.4.2 and earlier, WG2600HS2 Ver.1.3.2 and earlier, WX3000HP Ver.2.4.2…
more
and earlier and WX4200D5 Ver.1.2.4 and earlier allows a attacker to get a Wi-Fi password via the network.
Deeper analysisAI
CVE-2025-0355 is a Missing Authentication for Critical Function vulnerability (CWE-306) in multiple NEC Corporation Aterm router models, including WG2600HS Ver.1.7.2 and earlier, WF1200CRS Ver.1.6.0 and earlier, WG1200CRS Ver.1.5.0 and earlier, GB1200PE Ver.1.3.0 and earlier, WG2600HP4 Ver.1.4.2 and earlier, WG2600HM4 Ver.1.4.2 and earlier, WG2600HS2 Ver.1.3.2 and earlier, WX3000HP Ver.2.4.2 and earlier, and WX4200D5 Ver.1.2.4 and earlier. Published on 2025-01-15, the issue has a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N), indicating high confidentiality impact with no requirements for authentication or user interaction.
A network-accessible attacker can exploit this vulnerability remotely without privileges to retrieve the Wi-Fi password. The lack of authentication for a critical function enables unauthorized access to sensitive configuration data over the network.
NEC's security advisory provides details on mitigation, available at https://jpn.nec.com/security-info/secinfo/nv25-003_en.html.
Details
- CWE(s)