CVE-2024-25658: n/a
Cleartext storage of passwords in Infinera TNMS (Transcend Network Management System) Server 19.10.3 allows attackers (with access to the database or exported configuration files) to obtain SNMP users' usernames and passwords in cleartext.
AI Analysis
Technical Summary
CVE-2024-25658 identifies a security vulnerability in Infinera's Transcend Network Management System (TNMS) Server version 19.10.3, where SNMP user credentials are stored in cleartext within the system's database or exported configuration files. This vulnerability arises from improper credential storage practices, classified under CWE-312 (Cleartext Storage of Sensitive Information). Attackers who can access the database or configuration files—either through direct access, backup files, or misconfigured export mechanisms—can extract SNMP usernames and passwords without requiring any authentication or user interaction. SNMP credentials are critical for managing and monitoring network devices, and their compromise can lead to unauthorized network management operations, including configuration changes, monitoring disruption, or further lateral movement within the network. The vulnerability has a CVSS v3.1 base score of 6.5, indicating medium severity, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N). The scope is unchanged (S:U), and the impact affects confidentiality and integrity partially (C:L/I:L) but not availability (A:N). No known exploits have been reported in the wild yet, but the risk remains significant due to the sensitivity of the exposed credentials. There are currently no published patches, so mitigation relies on restricting access to the database and configuration files and monitoring for unauthorized access attempts.
Potential Impact
The primary impact of this vulnerability is the exposure of SNMP user credentials, which can lead to unauthorized access to network management functions. Attackers obtaining these credentials can manipulate network devices, alter configurations, disrupt monitoring, or pivot to other parts of the network, potentially causing operational disruptions and data breaches. Organizations relying on Infinera TNMS for managing critical telecommunications infrastructure or enterprise networks face increased risk of compromise. The confidentiality and integrity of network management data are at risk, which can undermine trust in network operations and lead to regulatory or compliance issues. Although availability is not directly impacted, the indirect effects of unauthorized configuration changes could cause network outages or degraded service. The vulnerability's ease of exploitation without authentication or user interaction increases the threat level, especially in environments where database or configuration file access controls are weak or misconfigured.
Mitigation Recommendations
To mitigate CVE-2024-25658, organizations should immediately restrict and monitor access to the Infinera TNMS database and any exported configuration files to trusted personnel only, employing strict file system permissions and network segmentation. Implement encryption at rest for databases and configuration files where possible to prevent cleartext exposure. Regularly audit and review access logs for unusual activity related to TNMS data stores. If available, apply vendor patches or updates addressing this vulnerability as soon as they are released. Consider rotating SNMP credentials and using SNMPv3 with encryption and authentication to reduce risk. Employ network-level protections such as firewalls and intrusion detection systems to limit exposure of TNMS servers and related management interfaces. Additionally, enforce strong operational security policies around backup and export procedures to avoid accidental credential leakage. Finally, conduct security awareness training for administrators managing TNMS systems to recognize and prevent unauthorized access scenarios.
Affected Countries
United States, Germany, Japan, South Korea, France, United Kingdom, China, India, Brazil, Canada, Australia
CVE-2024-25658: n/a
Description
Cleartext storage of passwords in Infinera TNMS (Transcend Network Management System) Server 19.10.3 allows attackers (with access to the database or exported configuration files) to obtain SNMP users' usernames and passwords in cleartext.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2024-25658 identifies a security vulnerability in Infinera's Transcend Network Management System (TNMS) Server version 19.10.3, where SNMP user credentials are stored in cleartext within the system's database or exported configuration files. This vulnerability arises from improper credential storage practices, classified under CWE-312 (Cleartext Storage of Sensitive Information). Attackers who can access the database or configuration files—either through direct access, backup files, or misconfigured export mechanisms—can extract SNMP usernames and passwords without requiring any authentication or user interaction. SNMP credentials are critical for managing and monitoring network devices, and their compromise can lead to unauthorized network management operations, including configuration changes, monitoring disruption, or further lateral movement within the network. The vulnerability has a CVSS v3.1 base score of 6.5, indicating medium severity, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N). The scope is unchanged (S:U), and the impact affects confidentiality and integrity partially (C:L/I:L) but not availability (A:N). No known exploits have been reported in the wild yet, but the risk remains significant due to the sensitivity of the exposed credentials. There are currently no published patches, so mitigation relies on restricting access to the database and configuration files and monitoring for unauthorized access attempts.
Potential Impact
The primary impact of this vulnerability is the exposure of SNMP user credentials, which can lead to unauthorized access to network management functions. Attackers obtaining these credentials can manipulate network devices, alter configurations, disrupt monitoring, or pivot to other parts of the network, potentially causing operational disruptions and data breaches. Organizations relying on Infinera TNMS for managing critical telecommunications infrastructure or enterprise networks face increased risk of compromise. The confidentiality and integrity of network management data are at risk, which can undermine trust in network operations and lead to regulatory or compliance issues. Although availability is not directly impacted, the indirect effects of unauthorized configuration changes could cause network outages or degraded service. The vulnerability's ease of exploitation without authentication or user interaction increases the threat level, especially in environments where database or configuration file access controls are weak or misconfigured.
Mitigation Recommendations
To mitigate CVE-2024-25658, organizations should immediately restrict and monitor access to the Infinera TNMS database and any exported configuration files to trusted personnel only, employing strict file system permissions and network segmentation. Implement encryption at rest for databases and configuration files where possible to prevent cleartext exposure. Regularly audit and review access logs for unusual activity related to TNMS data stores. If available, apply vendor patches or updates addressing this vulnerability as soon as they are released. Consider rotating SNMP credentials and using SNMPv3 with encryption and authentication to reduce risk. Employ network-level protections such as firewalls and intrusion detection systems to limit exposure of TNMS servers and related management interfaces. Additionally, enforce strong operational security policies around backup and export procedures to avoid accidental credential leakage. Finally, conduct security awareness training for administrators managing TNMS systems to recognize and prevent unauthorized access scenarios.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2024-02-09T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6d6db7ef31ef0b5720f6
Added to database: 2/25/2026, 9:45:17 PM
Last enriched: 2/26/2026, 10:42:58 AM
Last updated: 4/12/2026, 3:46:28 PM
Views: 16
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.