Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-25659: n/a

0
High
VulnerabilityCVE-2024-25659cvecve-2024-25659
Published: Tue Oct 01 2024 (10/01/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

In Infinera TNMS (Transcend Network Management System) 19.10.3, an insecure default configuration of the internal SFTP server on Linux servers allows remote attacker to access files and directories outside the SFTP user home directory.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 10:43:11 UTC

Technical Analysis

CVE-2024-25659 identifies a directory traversal vulnerability in the internal SFTP server component of Infinera's Transcend Network Management System (TNMS) version 19.10.3 running on Linux. The root cause is an insecure default configuration that fails to properly restrict SFTP users to their designated home directories, allowing remote attackers with high-level privileges to access files and directories outside their authorized scope. This vulnerability is classified under CWE-22 (Improper Limitation of a Pathname to a Restricted Directory). The CVSS v3.1 base score is 7.2, indicating high severity, with attack vector as network, low attack complexity, requiring privileges at a high level, no user interaction, and impacting confidentiality, integrity, and availability. The flaw could allow attackers to read, modify, or delete critical system or application files, potentially compromising the network management system's operation and exposing sensitive network configuration data. Although no public exploits or patches are currently available, the vulnerability poses a significant risk to organizations relying on Infinera TNMS for managing telecommunications infrastructure. The issue highlights the importance of secure default configurations, especially for internal services like SFTP that handle sensitive data transfers.

Potential Impact

The vulnerability could lead to unauthorized disclosure of sensitive network management files, modification or deletion of critical configuration data, and potential disruption of network management operations. This can compromise the confidentiality, integrity, and availability of the network management system, potentially cascading to broader network outages or security breaches. Organizations worldwide that use Infinera TNMS for managing telecommunications networks could face operational disruptions, data breaches, and increased risk of further exploitation if attackers leverage this vulnerability to escalate privileges or move laterally within the network. The impact is especially critical for telecom providers and enterprises relying on TNMS for network stability and security. Given the high privileges required, the threat is more relevant to insider threats or attackers who have already gained elevated access, but the network-exposed nature of the SFTP service increases the attack surface.

Mitigation Recommendations

Organizations should immediately audit and harden the SFTP server configuration within Infinera TNMS to ensure strict chroot or equivalent directory restrictions are enforced, preventing users from escaping their home directories. Implement access controls limiting SFTP usage to only necessary accounts with minimal privileges. Monitor SFTP logs for unusual access patterns or attempts to access unauthorized directories. Network segmentation should isolate management systems to reduce exposure. Employ multi-factor authentication and strong credential management for accounts with high privileges. Until an official patch is released, consider disabling the internal SFTP server if feasible or replacing it with a securely configured external SFTP solution. Regularly update and patch TNMS software once vendor fixes become available. Conduct penetration testing focused on directory traversal and privilege escalation scenarios within the management environment.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-02-09T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6d6db7ef31ef0b5720f9

Added to database: 2/25/2026, 9:45:17 PM

Last enriched: 2/26/2026, 10:43:11 AM

Last updated: 4/12/2026, 7:55:38 AM

Views: 19

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses