CVE-2025-46273

9.8 CRITICAL

📋 TL;DR

CVE-2025-46273 is a critical vulnerability in UNI-NMS-Lite network management software where hard-coded administrative credentials allow unauthenticated attackers to gain full control over all managed devices. This affects all organizations using vulnerable versions of UNI-NMS-Lite for network device management. Attackers can compromise the entire network infrastructure through this single point of failure.

💻 Affected Systems

Products:
  • UNI-NMS-Lite
Versions: All versions prior to 2.5.1
Operating Systems: Linux-based appliances
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations are vulnerable. The hard-coded credentials are embedded in the software and cannot be changed without patching.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete network takeover: attacker gains administrative access to all managed routers, switches, firewalls, and other network devices, enabling data theft, service disruption, lateral movement, and persistent backdoor installation.

🟠

Likely Case

Attacker gains administrative privileges to UNI-NMS-Lite and all managed devices, allowing configuration changes, credential harvesting, network reconnaissance, and potential ransomware deployment.

🟢

If Mitigated

Limited impact if UNI-NMS-Lite is isolated in a management VLAN with strict network segmentation, but still poses significant risk to managed devices.

🌐 Internet-Facing: HIGH - If UNI-NMS-Lite is exposed to the internet, attackers can easily discover and exploit it without authentication.
🏢 Internal Only: HIGH - Even internally, any compromised host or malicious insider can exploit this vulnerability to gain administrative network access.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires only network access to the UNI-NMS-Lite interface and knowledge of the hard-coded credentials. No authentication or special tools needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.5.1

Vendor Advisory: https://www.cisa.gov/news-events/ics-advisories/icsa-25-114-06

Restart Required: Yes

Instructions:

1. Download UNI-NMS-Lite version 2.5.1 from vendor portal. 2. Backup current configuration. 3. Stop UNI-NMS-Lite service. 4. Install the update. 5. Restart service. 6. Verify new credentials are required for login.

🔧 Temporary Workarounds

Network Isolation

all

Place UNI-NMS-Lite in a dedicated management VLAN with strict firewall rules limiting access to authorized administrative IPs only.

Access Control List

linux

Implement network ACLs to restrict access to UNI-NMS-Lite web interface and API endpoints.

# Example iptables rule: iptables -A INPUT -p tcp --dport 443 -s 10.0.0.0/24 -j ACCEPT
# Deny all other access: iptables -A INPUT -p tcp --dport 443 -j DROP

🧯 If You Can't Patch

  • Immediately isolate UNI-NMS-Lite from all non-management networks using firewall rules
  • Implement multi-factor authentication at network perimeter and monitor for unauthorized access attempts

🔍 How to Verify

Check if Vulnerable:

Attempt to login to UNI-NMS-Lite web interface using default credentials (check vendor advisory for specifics). If login succeeds without custom credentials, system is vulnerable.

Check Version:

curl -k https://<nms-ip>/api/version 2>/dev/null | grep version

Verify Fix Applied:

After patching, verify that default credentials no longer work and custom authentication is required. Check version is 2.5.1 or higher.

📡 Detection & Monitoring

Log Indicators:

  • Successful authentication with default/admin credentials
  • Multiple failed login attempts followed by success
  • Configuration changes from unexpected IP addresses

Network Indicators:

  • Unusual outbound connections from UNI-NMS-Lite to external IPs
  • SSH/Telnet connections from UNI-NMS-Lite to managed devices at unusual times

SIEM Query:

source="UNI-NMS-Lite" AND (event_type="authentication_success" AND user="admin") OR (event_type="configuration_change" AND source_ip!="trusted_admin_ip")

🔗 References

📤 Share & Export