CVE-2025-22937
Published: 31 March 2025
Summary
CVE-2025-22937 is a critical-severity Improper Privilege Management (CWE-269) vulnerability in Adtran 411 Firmware. Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked in the top 43.2% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and AC-6 (Least Privilege).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Requires organizations to identify, report, and correct system flaws like this privilege escalation vulnerability through timely firmware patching.
Enforces the principle of least privilege, directly countering the improper privilege management (CWE-269) that enables remote privilege escalation.
Mandates enforcement of approved access authorizations, preventing attackers from escalating privileges via unauthorized access to system resources.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Remote unauthenticated privilege escalation vulnerability on a network-accessible device directly maps to T1068 (Exploitation for Privilege Escalation) for gaining admin control and T1190 (Exploit Public-Facing Application) for remote exploitation of the device's management interface.
NVD Description
An issue in Adtran 411 ONT vL80.00.0011.M2 allows attackers to escalate privileges via unspecified vectors.
Deeper analysisAI
CVE-2025-22937 is a privilege escalation vulnerability affecting the Adtran 411 ONT running firmware version vL80.00.0011.M2. The issue, linked to CWE-269 (Improper Privilege Management), allows attackers to elevate privileges through unspecified vectors. It carries a CVSS v3.1 base score of 9.8 (Critical), reflecting network accessibility, low attack complexity, no required privileges or user interaction, and high impacts on confidentiality, integrity, and availability.
Remote attackers with network access to the affected ONT can exploit this vulnerability without authentication. Successful exploitation enables privilege escalation, potentially granting full administrative control over the device and leading to complete compromise, including data access, modification, or disruption of optical network terminal functions.
Advisories and further details on mitigation, including potential patches, are available in referenced sources such as https://drive.google.com/file/d/1levaZk5aC6g6a2zPW8xlOIVAu9MFYvAz/view and https://lanrat.com/posts/adtran-isp-hacking/. Security practitioners should consult these for vendor-specific remediation guidance. The CVE was published on 2025-03-31.
Details
- CWE(s)