VulnerabilitiesMEDIUM

Critical Vulnerability in Ceragon's MultiHaul and EtherHaul Devices

CICISA Advisories
CVE-2025-57176CeragonMultiHaulEtherHaulvulnerability
🎯

Basically, some Ceragon devices can be hacked to upload harmful files easily.

Quick Summary

A critical vulnerability has been found in Ceragon's MultiHaul and EtherHaul devices, allowing unauthorized file uploads. If you're using these devices, your network could be at risk. Ceragon has issued firmware updates to fix the issue, so don't delay in securing your equipment.

What Happened

A serious vulnerability has been discovered in Ceragon's MultiHaul and EtherHaul series devices. This flaw allows unauthorized users to upload any file to the devices, which could lead to significant security breaches. The issue affects multiple models, including the MultiHaul MH-B100-CCS and various EtherHaul models, making it a widespread concern for users worldwide.

The vulnerability, identified as CVE-2025-57176?, stems from a lack of authentication in the rfpiped service? running on TCP port 555?. This means that attackers can send files to any writable location on the devices without needing a password or any form of verification. The file upload process uses weak encryption?, leaving sensitive data exposed during transmission.

Why Should You Care

If you own or manage any of the affected Ceragon devices, this vulnerability could put your network at risk. Imagine leaving your front door unlocked — that's essentially what this flaw does for your equipment. Without proper security measures, hackers could exploit this vulnerability to gain control over your devices, potentially leading to data breaches or service disruptions.

In today’s digital landscape, your devices are like the keys to your home. If someone can upload harmful files, they could manipulate your network, steal sensitive information, or even disrupt your services. It’s crucial to take this threat seriously and act swiftly to protect your infrastructure.

What's Being Done

Ceragon has acknowledged the issue and released software updates to address the vulnerability. Here’s what you should do if you’re affected:

  • Install firmware version R2.4.0 for MultiHaul models.
  • Update to firmware version R10.8.1 for the EH-8010FX model.
  • For other EtherHaul models, install firmware version R7.7.12.

Additionally, Ceragon recommends following these security practices:

  • Use private management IP addresses? only.
  • Ensure your devices are behind firewalls? and access control lists?.
  • Avoid public exposure of management IP addresses.

Experts are monitoring the situation closely, especially for any potential exploits that could arise from this vulnerability. Stay vigilant and keep your devices updated to safeguard your network.

💡 Tap dotted terms for explanations

🔒 Pro insight: The lack of authentication in these devices mirrors past vulnerabilities, raising concerns about the security of critical infrastructure.

Original article from

CISA Advisories · CISA

Read Full Article

Related Pings

HIGHVulnerabilities

Windows 11 Bug Locks Users Out of System Drive C

A critical bug in Windows 11 is locking users out of their system drives. Affected Samsung devices are unable to access essential applications. Microsoft is investigating the issue and advises users to wait for a patch.

Cyber Security News·
HIGHVulnerabilities

Critical Coruna Flaw Fixed for Older iPhones and iPads

Apple has issued critical updates for older iPhones and iPads to fix the Coruna flaw. This vulnerability could expose sensitive data, making it essential for users to update their devices. Protect yourself by ensuring your device is up to date.

SC Media·
HIGHVulnerabilities

Cisco Catalyst SD-WAN Vulnerability Under Active Exploitation

CISA warns of a critical vulnerability in Cisco Catalyst SD-WAN systems. Federal agencies must act quickly to secure their networks. This flaw poses serious risks to sensitive data and operations.

SC Media·
MEDIUMVulnerabilities

Windows Autopatch to Default to Hotpatch Security Updates

Microsoft will soon enable hotpatch security updates by default for Windows Autopatch users. This change affects devices running Windows 11 version 24H2 or later. It aims to speed up security updates without requiring reboots, enhancing user experience and security.

SC Media·
HIGHVulnerabilities

Google Chrome Flaws Added to CISA's Exploited Vulnerabilities List

CISA has added two high-severity Google Chrome vulnerabilities to its Known Exploited Vulnerabilities catalog. Millions of users are at risk, as these flaws have already been exploited in the wild. Immediate updates and awareness are crucial to protect against potential attacks.

Security Affairs·
HIGHVulnerabilities

Old Industrial Controllers Spark Bidding War on eBay

A bidding war on eBay for 30-year-old industrial controllers raises cybersecurity concerns. These outdated systems pose risks to critical infrastructure. Immediate action is needed to secure them.

Dark Reading·