Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-25658: n/a

0
Medium
VulnerabilityCVE-2024-25658cvecve-2024-25658
Published: Tue Oct 01 2024 (10/01/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

Cleartext storage of passwords in Infinera TNMS (Transcend Network Management System) Server 19.10.3 allows attackers (with access to the database or exported configuration files) to obtain SNMP users' usernames and passwords in cleartext.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 10:42:58 UTC

Technical Analysis

CVE-2024-25658 identifies a security vulnerability in Infinera's Transcend Network Management System (TNMS) Server version 19.10.3, where SNMP user credentials are stored in cleartext within the system's database or exported configuration files. This vulnerability arises from improper credential storage practices, classified under CWE-312 (Cleartext Storage of Sensitive Information). Attackers who can access the database or configuration files—either through direct access, backup files, or misconfigured export mechanisms—can extract SNMP usernames and passwords without requiring any authentication or user interaction. SNMP credentials are critical for managing and monitoring network devices, and their compromise can lead to unauthorized network management operations, including configuration changes, monitoring disruption, or further lateral movement within the network. The vulnerability has a CVSS v3.1 base score of 6.5, indicating medium severity, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N). The scope is unchanged (S:U), and the impact affects confidentiality and integrity partially (C:L/I:L) but not availability (A:N). No known exploits have been reported in the wild yet, but the risk remains significant due to the sensitivity of the exposed credentials. There are currently no published patches, so mitigation relies on restricting access to the database and configuration files and monitoring for unauthorized access attempts.

Potential Impact

The primary impact of this vulnerability is the exposure of SNMP user credentials, which can lead to unauthorized access to network management functions. Attackers obtaining these credentials can manipulate network devices, alter configurations, disrupt monitoring, or pivot to other parts of the network, potentially causing operational disruptions and data breaches. Organizations relying on Infinera TNMS for managing critical telecommunications infrastructure or enterprise networks face increased risk of compromise. The confidentiality and integrity of network management data are at risk, which can undermine trust in network operations and lead to regulatory or compliance issues. Although availability is not directly impacted, the indirect effects of unauthorized configuration changes could cause network outages or degraded service. The vulnerability's ease of exploitation without authentication or user interaction increases the threat level, especially in environments where database or configuration file access controls are weak or misconfigured.

Mitigation Recommendations

To mitigate CVE-2024-25658, organizations should immediately restrict and monitor access to the Infinera TNMS database and any exported configuration files to trusted personnel only, employing strict file system permissions and network segmentation. Implement encryption at rest for databases and configuration files where possible to prevent cleartext exposure. Regularly audit and review access logs for unusual activity related to TNMS data stores. If available, apply vendor patches or updates addressing this vulnerability as soon as they are released. Consider rotating SNMP credentials and using SNMPv3 with encryption and authentication to reduce risk. Employ network-level protections such as firewalls and intrusion detection systems to limit exposure of TNMS servers and related management interfaces. Additionally, enforce strong operational security policies around backup and export procedures to avoid accidental credential leakage. Finally, conduct security awareness training for administrators managing TNMS systems to recognize and prevent unauthorized access scenarios.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-02-09T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6d6db7ef31ef0b5720f6

Added to database: 2/25/2026, 9:45:17 PM

Last enriched: 2/26/2026, 10:42:58 AM

Last updated: 4/12/2026, 3:46:28 PM

Views: 16

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses