Synacktiv Nokia BTS AirScale Asika Multiple Vulnerabilities
Synacktiv Nokia BTS AirScale Asika Multiple Vulnerabilities
Airscale ASIKA
CVE-2023-25186 / CVE-2023-25188
CVE-2023-25187 / CVE-2023-25185
Security advisory
2023/02/21
Geoffrey Bertoli
Lena David
Introduction
Synacktiv performed an audit on the base transceiver station Nokia Airscale ASIKA, running the firmware version
btsmed_5G19B_GNB_0007_001836_000863, and discovered multiple vulnerabilities:
The vulnerabilities affect several components of the device, including but not limited to:
• The underlying software running on Linux that handle the passwords and the authentication.
Affected versions
At the time of writing, the version btsmed_5G19B_GNB_0007_001836_000863 of the software is known to be vulnerable. All
vulnerabilities described below are fixed as of Nokia Single RAN 21B.
Timeline
Date Action
2022/08/08 Vulnerability details sent to [email protected].
2023/02/21 Public release.
Device Setup
In order to access the CCSDeamon on port 15007/tcp, the Ethernet Port Security should be disabled.
2/11
V-01 Relative Path Traversal (CVE-2023-25186)
Once the Ethernet port security is disabled, some services are accessible such as AaShell on port 15007/tcp, provided by the
CCSDaemonExe binary. It is possible to connect to the device using netcat.
$ nc 10.45.2.161 15007
AaShell>
This interface provides a limited Command Line Interface, and there is no authentication. Only the following commands are
accessible:
AaShell> ?
Command Description
------------------------------------
? Print description of commands
help Print description of commands
quit Quit shell session
cmd Read commands from file
proc Print list of running processes
node Prints own node related information
nodes Prints node related information for known nodes
procdump CC&S AaProcDump info
tag CC&S TAG parameter configuration
svc CC&S Service Registry parameter configuration
rad CC&S R&D parameter configuration
log CC&S trouble shooting log collection
regfile CC&S Trbl list of registered files
trblserver CC&S AaTrblServer control commands
tpclient CC&S TestPorst client status
tpserver CC&S TestPort server status
tbts CC&S test case control
sicftp CC&S SICFTP service
volume CC&S storage volumes information
mema CC&S mem adapter services
mtrace Help command for glibc mtrace functionality
rel CC&S release tag
msgpool CC&S IPC message pool info
msghistory CC&S IPC message pool history info
rtoseu CC&S RTOSApi eu info
aastat CC&S statistics info
syslog CC&S AaSysLog info
print CC&S AaSysLog printing command
sysinfo CC&S AaSysInfo info
atrace CC&S Allocation Tracing info
mb CC&S Message Broker info
systime CC&S AaSysTime info
cpid CC&S Cpid info
largemsggw CC&S AaSysCom LargeMsgGW info
link CC&S AaSysCom Link info
hop CC&S AaSysCom Hop info
syscom CC&S AaSysCom performance tests
dropped CC&S AaSysCom Drop History
msgstats CC&S AaSysCom Message Send Statistics
bind CC&S AaSysCom Bind info
aasyscomgw CC&S AaSysCom GW info
error CC&S AaError info
prof CC&S AaCpuProfiler Service Command
aasyscomkernelgw CC&S AaSysComKernel GW info
pcapFileCaptureStart Start AaPacketCapture with capture to a file
pcapCaptureStatus Show status of captures
pcapCaptureStop Stop capture
pcapLiveCaptureReceiver Set receiver of captured data
pcapLiveCaptureStart Start AaPacketCapture with live capture to a remote endpoint
udslink CC&S AaSysComUdsLink info
3/11
Using the cmd command, it is possible to read and execute a list of commands from a file.
AaShell> cmd
NAME
CC&S Shell Commands from File
USAGE
cmd source
Example:
cmd /ram/cmdfile.txt
As shown on the code block above, it is possible to read the command files only in the /ram folder. However, this check is
affected by a path traversal vulnerability. Moreover, since the CCSDaemonExe service is running with root privileges, it is
possible to read any file on the BTS file system, such as /etc/shadow.
Reading any file not containing commands will print an error message with the content of the line where the error was triggered.
This behavior mixed with the path traversal vulnerability allows dumping the content of any file on the system.
4/11
V-02 Principle of least privilege (CVE-2023-25188)
The principle of least privilege, or least privilege access is a security principle that runs on the assumption that everyone is a
potential threat and because of that, they should only be granted the permissions they need to complete their job function. The
principle of least privilege extends beyond human users, and can be applied to programs, applications, systems, and devices.
It has been identified that the Nokia Airscale ASIKA does not apply this principle, especially for the following services:
If an attacker gained remote code execution on any of these services (as it is possible for the aashell V-01), they would be able to
gain full access to the underlying server.
Moreover, the default root configured for the FTP server is the root of the filesystem, meaning that it is possible for an attacker
having access to the FTP service to trigger remote code execution.
5/11
V-03 Use of Hard-coded private key (CVE-2023-25187)
On the Linux operating system, there are 2 accounts :
• toor4nsn
• serviceuser
These users have a default public key registered in the SSH authorized_keys file in their home folder. These SSH keys are
hardcoded in the software package provided by Nokia.
6/11
V-04 Privilege escalation though improperly protected services (CVE-2023-25185)
The following services are configured with systemd units having broad permissions.
7/11
Appendices – CVE details provided by Nokia
CVE-2023-25186
Attack Vector :
"A mobile network solution internal fault was found in Nokia Single RAN SW releases
19B, 20A, 20B, 20C and 21A. Exploit of this fault is not possible from outside of
mobile network solution architecture which is from user UEs or roaming networks or
from Internet. Exploit is possible only from CSP mobile network solution internal BTS
management network. To exploit the vulnerability, BTS administrator has to disable
the recommended 'Security for Ethernet ports' (SOE) flag i.e. a security hardening
feature from BTS. Only after this the AaShell diagnostic tool becomes active and
communication service provider(CSP) staff can misuse the AaShell for reading BTS
internal file-system without AaShell requesting login authentication.
From release 21B onwards, AaShell has been hardened to restrict access to the
loopback address only so that one can access Aashell only after autheticating to BTS,
and also fixed path traversal issue."
Description :
If/when Communication Service Provider(CSP) (as BTS administrator) removes security
hardenings from Nokia Single RAN BTS baseband unit, a directory path traversal in
Nokia BTS baseband unit diagnostic tool AaShell (which is by default disabled)
provides access to BTS baseband unit internal filesystem from mobile network solution
internal BTS management network.
8/11
CVE-2023-25188
Attack Vector :
"A mobile network solution internal fault was found in Nokia Single RAN SW releases
19B, 20A, 20B, 20C and 21A. Exploit of this fault is not possible from outside of
mobile network solution architecture. That is from user UEs or roaming networks or
from Internet. Exploit is possible only from CSP mobile network solution internal BTS
management network. To exploit the vulnerability, BTS administrator has to disable
the recommended 'Security for Ethernet ports' (SOE) flag i.e. a security hardening
feature from BTS. Only after this the AaShell diagnostic tool becomes active and
communication service provider(CSP) staff can misuse the AaShell for gaining
unauthenticated access to BTS internal processes running with high privileges in BTS
embedded Linux OS.
From release 21B onwards, AaShell has been hardened to restrict access to the
loopback address only so that one can access Aashell only after autheticating to BTS.
Also process privileges have been tighten to required level."
Description :
If/when CSP (as BTS administrator) removes security hardenings from Nokia Single RAN
BTS baseband unit, BTS baseband unit diagnostic tool AaShell (which is by default
disabled) allows unauthenticated access from mobile network solution internal BTS
management network to BTS embedded Linux operating system level.
9/11
CVE-2023-25187
Attack Vector :
"A mobile network solution internal fault was found in Nokia Single RAN SW releases
19B, 20A, 20B, 20C and 21A. The fault does not exist (i.e., is fixed) release 21B
onwards. Exploit of this Nokia BTS product fault (i.e. vulnerability) is not possible
from outside of mobile network solution architecture. This means that exploit is not
possible from mobile network user UEs, from roaming networks, or from Internet.
Exploit is possible only from CSP mobile network solution internal BTS management
network. To exploit the vulnerability, BTS administrator has to configurable enable
SSH server in BTS baseband unit. The BTS SSH server is by default disabled and
enabled only in deep level troubleshooting activities."
Description :
"Nokia Single RAN commissioning procedures do not change (factory time installed)
default SSH public/private key values for network operator specific. As a result, CSP
internal BTS network SSH server(disabled by default) continues to apply the default
SSH public/private key values. These keys don't give access to BTS, as service user
authentication is username/password based on top of SSH.
Nokia factory installed default SSH keys are meant to be changed operator specific
during BTS deployment commissioning phase. However, before 21B release, BTS
commissioning manuals do not instruct to change default SSH keys(to BTS operator
specific). This gives possibility for malicious operability staff inside CSP network,
attempt MITM exploit for BTS service user access, during the moments SSH is enabled
for Nokia service personnel for troubleshooring activities.
From release 21B onwards BTS commissioning procedures change Nokia default SSH keys
to operator specific."
10/11
CVE-2023-25185
Description :
A mobile network solution internal fault was found in Nokia Single RAN software
releases that certain software processes in BTS internal software design have
unnecessary high privileges to BTS embedded operating system (OS) resources. Nokia
has lowered the privileges of these processes in Single RAN SW release 21B onwards,
as BTS internal security hardening act.
11/11