CVE-2025-61330

6.5 MEDIUM

📋 TL;DR

A hard-coded weak password vulnerability in H3C Magic-branded devices allows attackers to gain root access via Telnet. This affects all Magic-branded network equipment from H3C, particularly when Telnet is enabled or devices are exposed to public networks through Virtual Servers.

💻 Affected Systems

Products:
  • All H3C Magic-branded network devices
Versions: All versions with vulnerable firmware
Operating Systems: Embedded firmware on H3C Magic devices
Default Config Vulnerable: ⚠️ Yes
Notes: Devices with Telnet enabled (default or via /debug.asp interfaces) and those using Virtual Servers for public exposure are most vulnerable.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain complete control of devices, enabling network compromise, data interception, or use as attack platforms.

🟠

Likely Case

Unauthorized root access leading to device configuration changes, network disruption, or credential theft.

🟢

If Mitigated

Limited impact if Telnet is disabled and devices are not internet-facing.

🌐 Internet-Facing: HIGH - Devices with Virtual Servers mapping to public networks are directly exploitable remotely.
🏢 Internal Only: MEDIUM - Internal attackers or compromised internal systems could exploit if Telnet is enabled.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires Telnet access and knowledge of hard-coded credentials, but no authentication bypass is needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor for specific firmware updates

Vendor Advisory: https://www.h3c.com/en/Support/

Restart Required: No

Instructions:

1. Check H3C support for firmware updates. 2. Download and apply the latest firmware. 3. Verify root password is changed or removed.

🔧 Temporary Workarounds

Disable Telnet Service

all

Prevent Telnet access to block exploitation vector.

telnet disable

Change Root Password

all

Manually set a strong root password in /etc/shadow.

passwd root

🧯 If You Can't Patch

  • Disable Telnet service immediately and use SSH with strong authentication.
  • Remove Virtual Server mappings to prevent internet exposure.

🔍 How to Verify

Check if Vulnerable:

Attempt Telnet login with common weak passwords or check /etc/shadow for hard-coded credentials.

Check Version:

show version

Verify Fix Applied:

Confirm Telnet is disabled and root password is changed or strong.

📡 Detection & Monitoring

Log Indicators:

  • Failed/successful Telnet login attempts, especially for root account.

Network Indicators:

  • Telnet connections to device IPs, unusual outbound traffic from devices.

SIEM Query:

source="telnet" AND (user="root" OR auth_failure)

🔗 References

📤 Share & Export