CVE-2025-22940
Published: 31 March 2025
Summary
CVE-2025-22940 is a critical-severity Improper Access Control (CWE-284) vulnerability in Adtran 411 Firmware. Its CVSS base score is 9.1 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 44.5% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and IA-5 (Authenticator Management).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly remediates the specific firmware flaw enabling unauthorized admin password changes in Adtran 411 ONT L80.00.0011.M2.
Enforces approved authorizations for logical access, preventing unauthorized attackers from arbitrarily setting the admin password.
Manages and protects system authenticators such as passwords against unauthorized arbitrary modifications.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The CVE describes an unauthenticated remote vulnerability allowing arbitrary admin password setting on a public-facing ONT device, enabling exploitation via T1190 for initial access and facilitating T1098 by permitting unauthorized account password changes.
NVD Description
Incorrect access control in Adtran 411 ONT L80.00.0011.M2 allows unauthorized attackers to arbitrarily set the admin password.
Deeper analysisAI
CVE-2025-22940 is an incorrect access control vulnerability affecting the Adtran 411 ONT running firmware version L80.00.0011.M2. It enables unauthorized attackers to arbitrarily set the admin password, as documented under CWE-284. The vulnerability has a CVSS v3.1 base score of 9.1 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N), indicating critical severity due to its network accessibility, low attack complexity, and lack of prerequisites.
Remote attackers require no privileges or user interaction to exploit this flaw over the network. Successful exploitation allows them to set the admin password, granting high-level confidentiality and integrity impacts, such as full administrative control over the device without affecting availability.
Mitigation details and advisories are referenced in the following sources: https://drive.google.com/file/d/1levaZk5aC6g6a2zPW8xlOIVAu9MFYvAz/view, https://lanrat.com/posts/adtran-isp-hacking/, and https://drive.google.com/file/d/1levaZk5aC6g6a2zPW8xlOIVAu9MFYvAz/view.
Details
- CWE(s)