CVE-2024-25010

8.8 HIGH

📋 TL;DR

Ericsson RAN Compute and Site Controller 6610 contains an improper input validation vulnerability that could allow attackers to execute arbitrary code on affected systems. This affects telecommunications infrastructure running vulnerable configurations of these Ericsson products. Successful exploitation could compromise critical network equipment.

💻 Affected Systems

Products:
  • Ericsson RAN Compute 6610
  • Ericsson Site Controller 6610
Versions: Specific versions not publicly detailed in advisory
Operating Systems: Proprietary Ericsson OS
Default Config Vulnerable: ✅ No
Notes: Only vulnerable in certain configurations as specified by Ericsson. Requires specific conditions to be exploitable.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attacker to execute arbitrary code, disrupt telecommunications services, pivot to other network segments, and potentially cause widespread service outages.

🟠

Likely Case

Local or remote code execution leading to service disruption, data exfiltration, or lateral movement within the telecommunications network.

🟢

If Mitigated

Limited impact with proper network segmentation, input validation, and access controls preventing exploitation attempts.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires specific vulnerable configurations and likely some level of access to the system. No public exploit code available at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified in public advisory

Vendor Advisory: https://www.ericsson.com/en/about-us/security/psirt/CVE-2024-25010

Restart Required: Yes

Instructions:

1. Contact Ericsson support for specific patch information. 2. Apply the security update provided by Ericsson. 3. Restart affected systems as required. 4. Verify the patch was successfully applied.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate Ericsson RAN Compute and Site Controller systems from untrusted networks and limit access to authorized personnel only.

Input Validation Enhancement

all

Implement additional input validation controls at network perimeter or through intermediary systems.

🧯 If You Can't Patch

  • Implement strict network access controls and segmentation to limit exposure
  • Monitor systems for unusual activity and implement enhanced logging

🔍 How to Verify

Check if Vulnerable:

Check system configuration against Ericsson's vulnerability criteria and review system logs for exploitation attempts.

Check Version:

Use Ericsson-specific management commands or contact Ericsson support for version verification

Verify Fix Applied:

Verify patch installation through Ericsson management tools and confirm system is running updated software version.

📡 Detection & Monitoring

Log Indicators:

  • Unusual process execution
  • Unexpected system modifications
  • Authentication anomalies

Network Indicators:

  • Unusual network traffic to/from Ericsson systems
  • Unexpected protocol usage

SIEM Query:

source="ericsson_systems" AND (event_type="process_execution" OR event_type="system_modification")

🔗 References

📤 Share & Export