CVE-2025-24333

Administrative user shell input validation fault

Description

Nokia Single RAN baseband software earlier than 24R1-SR 1.0 MP contains administrative shell input validation fault, which authenticated admin user can, in theory, potentially use for injecting arbitrary commands for unprivileged baseband OAM service process execution via special characters added to baseband internal COMA_config.xml file. This issue has been corrected starting from release 24R1-SR 1.0 MP and later, by adding proper input validation to OAM service process which prevents injecting special characters via baseband internal COMA_config.xml file.

Category

6.4
CVSS
Severity: Medium
CVSS 3.1 •
EPSS 0.02%
Affected: Nokia Nokia Single RAN
Published at:
Updated at:

References

Frequently Asked Questions

What is the severity of CVE-2025-24333?
CVE-2025-24333 has been scored as a medium severity vulnerability.
How to fix CVE-2025-24333?
To fix CVE-2025-24333, make sure you are using an up-to-date version of the affected component(s) by checking the vendor release notes. As for now, there are no other specific guidelines available.
Is CVE-2025-24333 being actively exploited in the wild?
As for now, there are no information to confirm that CVE-2025-24333 is being actively exploited. According to its EPSS score, there is a ~0% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2025-24333?
CVE-2025-24333 affects Nokia Nokia Single RAN.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.