Description
Use of a hard-coded AES-256-CBC key in the configuration backup/restore implementation of Small Cell Sercomm SCE4255W (FreedomFi Englewood) firmware before DG3934v3@2308041842 allows remote authenticated users to decrypt, modify, and re-encrypt device configurations, enabling credential manipulation and privilege escalation via the GUI import/export functions.
Published: 2026-03-19
Score: 9.8 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Privilege Escalation
Action: Immediate Patch
AI Analysis

Impact

The vulnerability arises from a hard‑coded AES‑256‑CBC key embedded in the configuration backup/restore routines of the Sercomm SCE4255W (FreedomFi Englewood). An authenticated user can export a configuration file, have the device decrypt it using the internal key, modify user credentials, re‑encrypt the file, and import it back. This manipulation permits an attacker to replace existing administrative credentials or create new privileged accounts, effectively elevating privileges on the device. The weakness corresponds to CWE‑321, the use of non‑random keys.

Affected Systems

Affected devices are the Sercomm SCE4255W (FreedomFi Englewood) small‑cell radios running firmware versions earlier than DG3934v3@2308041842. The known references point to the 2025 firmware build, suggesting that any device firmware deployed before this build inherits the hard‑coded key. Network administrators should verify the firmware release on each unit and mark those running older builds as vulnerable.

Risk and Exploitability

The CVSS score of 9.8 indicates a maximum severity, yet the EPSS score is below 1 %, and the weakness is not listed in the CISA KEV catalog. The attack requires remote authenticated access and interaction with the GUI import/export functions; an attacker who gains credentials can carry out the exploit without additional code execution. Given the high impact and the ease of manipulating configuration data, systems operators should treat this as an imminent threat and address it immediately.

Generated by OpenCVE AI on March 24, 2026 at 03:28 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the vendor’s latest firmware update (DG3934v3 or newer) that removes the hard‑coded AES key.
  • If an update cannot be applied immediately, disable the configuration import/export options in the device GUI.
  • Isolate the affected devices from the untrusted network until a secure update is installed.
  • Continuously monitor authentication and configuration logs for unauthorized export/import activity.
  • Verify after patching that the firmware no longer contains the hard‑coded key and that importing configurations no longer permits credential changes.

Generated by OpenCVE AI on March 24, 2026 at 03:28 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 25 Mar 2026 12:00:00 +0000

Type Values Removed Values Added
Title Hard‑coded AES‑256 Key Enables Remote Decryption, Modification, and Privilege Escalation in FreedomFi Sercomm SCE4255W

Tue, 24 Mar 2026 02:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-321
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 20 Mar 2026 09:00:00 +0000

Type Values Removed Values Added
First Time appeared Freedomfi
Freedomfi sercomm Sce4255w
Vendors & Products Freedomfi
Freedomfi sercomm Sce4255w

Thu, 19 Mar 2026 17:45:00 +0000

Type Values Removed Values Added
Description Use of a hard-coded AES-256-CBC key in the configuration backup/restore implementation of Small Cell Sercomm SCE4255W (FreedomFi Englewood) firmware before DG3934v3@2308041842 allows remote authenticated users to decrypt, modify, and re-encrypt device configurations, enabling credential manipulation and privilege escalation via the GUI import/export functions.
References

Subscriptions

Freedomfi Sercomm Sce4255w
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-03-24T01:17:45.000Z

Reserved: 2025-12-08T00:00:00.000Z

Link: CVE-2025-67112

cve-icon Vulnrichment

Updated: 2026-03-24T01:17:39.837Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-19T18:16:15.450

Modified: 2026-03-24T02:16:03.450

Link: CVE-2025-67112

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-25T11:51:43Z

Weaknesses