CVE-2025-67015

Comtech · Comtech EF Data CDM-625 / CDM-625A Advanced Satellite Modem

A high-severity vulnerability has been discovered in specific Comtech EF Data Advanced Satellite Modem models, identified as CVE-2025-67015.

Executive summary

A high-severity vulnerability has been discovered in specific Comtech EF Data Advanced Satellite Modem models, identified as CVE-2025-67015. This flaw, caused by an incorrect access control mechanism, could allow a remote attacker to bypass security restrictions and gain unauthorized administrative control over the affected device. Successful exploitation could lead to service disruption, data interception, and a complete compromise of the satellite communication link.

Vulnerability

The vulnerability is an incorrect access control flaw within the modem's management interface. A remote attacker with network access to the device can send a specially crafted request that bypasses standard authentication and authorization checks. This allows a low-privileged or unauthenticated user to access and execute functions reserved for administrative users, effectively granting them full control over the modem's configuration and operation.

Business impact

This vulnerability is rated as High severity with a CVSS score of 7.5. Exploitation of this flaw could have significant business impacts, including the disruption of critical communication systems that rely on the satellite link for connectivity. An attacker could reconfigure the modem to cause a denial of service, intercept sensitive data passing through the device (loss of confidentiality), or modify its configuration to redirect traffic (loss of integrity). For organizations in sectors like telecommunications, government, and maritime, this could lead to operational failure, financial loss, and reputational damage.

Remediation

Immediate Action: The primary remediation is to apply the security updates provided by the vendor (Comtech EF Data) immediately. Organizations should prioritize patching systems, especially those with management interfaces exposed to untrusted networks.

Proactive Monitoring: Monitor device and network logs for any signs of compromise. Specifically, look for unusual access patterns to the management interface, unauthorized configuration changes, unexpected reboots, or login attempts from unknown IP addresses. Implement alerts for any access to administrative functions from non-administrative accounts.

Compensating Controls: If immediate patching is not feasible, implement the following compensating controls:

  • Restrict network access to the modem's management interface using firewalls or Access Control Lists (ACLs), ensuring only trusted administrative workstations can connect.
  • Isolate the modems in a segmented network zone to limit lateral movement in the event of a compromise.
  • Ensure strong, unique credentials are in use for all administrative accounts on the device.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Given the high severity (CVSS 7.5) of this vulnerability and its potential to disrupt critical communication infrastructure, we strongly recommend immediate action. While this vulnerability is not currently listed on the CISA Known Exploited Vulnerabilities (KEV) catalog, its impact is significant enough to warrant urgent attention. Organizations must prioritize applying the vendor-supplied patches to all affected Comtech EF Data modems or, if patching is not possible, implement the recommended compensating controls to mitigate the risk of exploitation.