CVE-2025-1143
Published: 11 February 2025
Summary
CVE-2025-1143 is a high-severity Use of Hard-coded Credentials (CWE-798) vulnerability in Org (inferred from references). Its CVSS base score is 8.4 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique SSH (T1021.004); ranked at the 25.1th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 AC-2 (Account Management) and IA-5 (Authenticator Management).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly requires managing and changing default authenticators, preventing the use of hard-coded credentials for SSH access.
Ensures proper account management including disabling unnecessary accounts and changing default credentials to block unauthorized root logins.
Mandates identification, reporting, and correction of flaws like hard-coded credentials through timely patching and firmware updates.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Hard-coded credentials directly enable root login via exposed SSH (T1021.004), use of valid local accounts (T1078.003), and external remote services access (T1133).
NVD Description
Certain models of routers from Billion Electric has hard-coded embedded linux credentials, allowing attackers to log in through the SSH service using these credentials and obtain root privilege of the system.
Deeper analysisAI
CVE-2025-1143 is a vulnerability in certain models of routers from Billion Electric that involves hard-coded embedded Linux credentials. These credentials enable unauthorized access through the SSH service, allowing attackers to log in and obtain root privileges on the affected systems. Published on 2025-02-11, the issue has a CVSS v3.1 base score of 8.4 (AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) and maps to CWE-798 (Use of Hard-coded Credentials).
The attack requires local access (AV:L) with low complexity and no privileges (PR:N). An attacker can exploit it by connecting to the exposed SSH service using the hard-coded credentials, achieving root-level control. This results in high impacts on confidentiality, integrity, and availability, potentially leading to full compromise of the router.
Mitigation details are available in advisories from TWCERT, including https://www.twcert.org.tw/en/cp-139-8414-096ce-2.html and https://www.twcert.org.tw/tw/cp-132-8413-ec9a5-1.html.
Details
- CWE(s)