PatchSiren

PatchSiren cyber security CVE debrief

CVE-2025-2185 ALBEDO Telecom CVE debrief

CVE-2025-2185 is a high-severity issue in ALBEDO Telecom Net.Time - PTP/NTP clock software 1.4.4. CISA describes an insufficient session expiration weakness that could allow passwords to be transmitted over unencrypted connections, creating interception risk. The supplied advisory lists an update to software v1.6.1 as the mitigation.

Vendor
ALBEDO Telecom
Product
Net.Time - PTP/NTP clock (Serial No. NBC0081P)
CVSS
HIGH 8
CISA KEV
Not listed in stored evidence
Original CVE published
2025-04-24
Original CVE updated
2025-04-24
Advisory published
2025-04-24
Advisory updated
2025-04-24

Who should care

OT/ICS administrators, plant engineers, and security teams responsible for ALBEDO Telecom Net.Time - PTP/NTP clock deployments, especially systems still running software release 1.4.4.

Technical summary

The advisory identifies one affected product/version: ALBEDO Telecom Net.Time - PTP/NTP clock (Serial No. NBC0081P), Software__1.4.4. The weakness is described as insufficient session expiration, with the practical impact that passwords may be transmitted over unencrypted connections and become susceptible to interception. The supplied CVSS 3.1 vector is AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H, matching a HIGH severity score of 8.0.

Defensive priority

High. The issue affects an OT/ICS device and involves credential exposure risk, so remediation should be prioritized for any environment using the impacted software version.

Recommended defensive actions

  • Confirm whether any ALBEDO Telecom Net.Time - PTP/NTP clock devices are running software release 1.4.4.
  • Apply the vendor mitigation from the advisory: update the affected software to v1.6.1.
  • Until remediation is complete, reduce exposure of management access and avoid transmitting credentials over unencrypted paths where possible.
  • Follow CISA industrial control system recommended practices for hardening, segmentation, and defensive monitoring.
  • Coordinate with ALBEDO Telecom if upgrade planning or support is needed, using the vendor contact listed in the advisory.

Evidence notes

All key claims are taken from the supplied CISA CSAF advisory data for ICSA-25-114-02, published and modified on 2025-04-24. The source names ALBEDO Telecom as the vendor, identifies the affected product/version as Software__1.4.4, describes the insufficient session expiration weakness and interception risk, and lists update to v1.6.1 as the mitigation. The supplied enrichment does not place this CVE in CISA KEV.

Official resources

Publicly disclosed by CISA in the ICSA-25-114-02 advisory on 2025-04-24; the supplied data shows the CVE published and modified on the same date.