CVE-2025-43980

6.5 MEDIUM

📋 TL;DR

FIRSTNUM JC21A-04 devices have SSH enabled by default with hardcoded root/admin credentials that cannot be disabled via the GUI. This allows attackers to gain administrative access to affected devices. All users of FIRSTNUM JC21A-04 devices through version 2.01ME/FN are affected.

💻 Affected Systems

Products:
  • FIRSTNUM JC21A-04
Versions: through 2.01ME/FN
Operating Systems: Embedded device firmware
Default Config Vulnerable: ⚠️ Yes
Notes: All devices with default configuration are vulnerable. The GUI lacks an option to disable the SSH service or change these credentials.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device compromise leading to data theft, network pivoting, or device becoming part of a botnet.

🟠

Likely Case

Unauthorized administrative access allowing configuration changes, data exfiltration, or service disruption.

🟢

If Mitigated

Limited impact if SSH is disabled or credentials are changed via alternative methods.

🌐 Internet-Facing: HIGH - Devices exposed to the internet can be easily discovered and exploited.
🏢 Internal Only: MEDIUM - Internal attackers or compromised systems could exploit this vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires network access to SSH port (typically 22) and knowledge of default credentials. No authentication bypass needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions after 2.01ME/FN

Vendor Advisory: https://github.com/actuator/cve/blob/main/Firstnum/CVE-2025-43980.txt

Restart Required: No

Instructions:

1. Check for firmware updates from FIRSTNUM. 2. Apply the latest firmware version that addresses this vulnerability. 3. Verify SSH service configuration after update.

🔧 Temporary Workarounds

Change SSH credentials via CLI

all

Manually change the root password via SSH command line if GUI doesn't support it

ssh root@device_ip
admin
passwd
Enter new password

Disable SSH service

all

Disable SSH service through command line if available

ssh root@device_ip
admin
systemctl disable ssh
systemctl stop ssh

🧯 If You Can't Patch

  • Change default SSH credentials immediately using command line access
  • Implement network segmentation to restrict SSH access to trusted management networks only
  • Deploy network-based controls to block SSH traffic to affected devices

🔍 How to Verify

Check if Vulnerable:

Attempt SSH connection to device port 22 using root/admin credentials. If successful, device is vulnerable.

Check Version:

ssh root@device_ip 'cat /etc/version' or check via device web interface

Verify Fix Applied:

Attempt SSH connection with root/admin credentials. Connection should fail. Verify firmware version is newer than 2.01ME/FN.

📡 Detection & Monitoring

Log Indicators:

  • Failed SSH authentication attempts
  • Successful SSH logins with root/admin credentials
  • Unusual SSH connection patterns

Network Indicators:

  • SSH connections to port 22 from unexpected sources
  • Brute force attempts against SSH service

SIEM Query:

source="ssh" AND (user="root" OR user="admin") AND success="true"

🔗 References

📤 Share & Export