SSH Key Mismanagement in NOKIA Airscale ASIKA Single RAN Devices
CVE-2023-25187
7HIGH
Summary
A vulnerability has been identified in NOKIA Airscale ASIKA Single RAN devices prior to version 21B due to inadequate procedures for managing SSH public/private keys. The devices retain original factory default keys specific to network operators, and the default SSH server meant to be deactivated poses a risk. Specifically, during commissioning, instructions to replace these default keys with operator-specific values were not provided in the manuals. This oversight can facilitate man-in-the-middle (MITM) attacks by malicious insiders when SSH is enabled for service activities, potentially compromising secure access to the base transceiver station (BTS) services while troubleshooting.
References
CVSS V3.1
Score:
7
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
High
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved