CVE-2025-0980: Vulnerability in Nokia SR Linux
Nokia SR Linux is vulnerable to an authentication vulnerability allowing unauthorized access to the JSON-RPC service. When exploited, an invalid validation allows JSON RPC access without providing valid authentication credentials.
AI Analysis
Technical Summary
CVE-2025-0980 is a critical authentication bypass vulnerability identified in Nokia SR Linux, a network operating system widely used in telecom and enterprise environments. The flaw resides in the JSON-RPC service, which is designed to allow remote procedure calls over JSON for device management and automation. Due to improper validation logic, the service permits access without requiring valid authentication credentials, effectively allowing an attacker to interact with the device management interface unauthenticated. This can lead to unauthorized configuration changes, information disclosure, or disruption of network operations. The affected versions are all releases prior to 23.10.6 and 24.10.2, indicating that Nokia has addressed the issue in these or later versions. No public exploit code or active exploitation has been reported yet, but the vulnerability's nature makes it highly exploitable if discovered by malicious actors. The lack of a CVSS score suggests the need for a severity assessment based on impact and exploitability factors. Given that the vulnerability compromises authentication controls and exposes critical management interfaces, the risk to network integrity and availability is significant. The vulnerability is particularly concerning for organizations relying on Nokia SR Linux for core network infrastructure, as unauthorized access could facilitate lateral movement, persistent access, or denial of service.
Potential Impact
For European organizations, the impact of CVE-2025-0980 could be severe. Unauthorized access to network device management interfaces can lead to manipulation of routing, firewall rules, or other critical configurations, potentially causing network outages or data interception. Telecom operators, internet service providers, and large enterprises using Nokia SR Linux are at heightened risk, as their infrastructure is critical for communications and business continuity. Compromise could also enable attackers to pivot to other internal systems, increasing the scope of damage. Confidentiality is at risk due to potential exposure of sensitive configuration data; integrity is threatened by unauthorized changes; and availability could be impacted by disruptive actions. The absence of known exploits currently provides a window for proactive mitigation, but the vulnerability’s ease of exploitation and critical role of affected systems elevate the threat level. Regulatory compliance in Europe, including GDPR and NIS Directive requirements, may also be impacted if this vulnerability leads to data breaches or service disruptions.
Mitigation Recommendations
Organizations should immediately inventory their network devices to identify Nokia SR Linux instances running affected versions. They must prioritize upgrading to versions 23.10.6, 24.10.2, or later where the vulnerability is patched. Until patches are applied, access to the JSON-RPC service should be strictly limited via network segmentation, firewall rules, or VPNs to trusted administrators only. Implementing strong network access controls and monitoring for unusual JSON-RPC activity can help detect exploitation attempts. Additionally, organizations should review and harden authentication mechanisms and consider disabling unused management interfaces. Regular auditing of device configurations and logs will aid in early detection of unauthorized access. Coordination with Nokia support for guidance and updates is recommended. Finally, integrating this vulnerability into incident response plans will prepare teams for rapid action if exploitation is detected.
Affected Countries
Germany, France, United Kingdom, Sweden, Finland, Norway, Netherlands, Italy, Spain
CVE-2025-0980: Vulnerability in Nokia SR Linux
Description
Nokia SR Linux is vulnerable to an authentication vulnerability allowing unauthorized access to the JSON-RPC service. When exploited, an invalid validation allows JSON RPC access without providing valid authentication credentials.
AI-Powered Analysis
Technical Analysis
CVE-2025-0980 is a critical authentication bypass vulnerability identified in Nokia SR Linux, a network operating system widely used in telecom and enterprise environments. The flaw resides in the JSON-RPC service, which is designed to allow remote procedure calls over JSON for device management and automation. Due to improper validation logic, the service permits access without requiring valid authentication credentials, effectively allowing an attacker to interact with the device management interface unauthenticated. This can lead to unauthorized configuration changes, information disclosure, or disruption of network operations. The affected versions are all releases prior to 23.10.6 and 24.10.2, indicating that Nokia has addressed the issue in these or later versions. No public exploit code or active exploitation has been reported yet, but the vulnerability's nature makes it highly exploitable if discovered by malicious actors. The lack of a CVSS score suggests the need for a severity assessment based on impact and exploitability factors. Given that the vulnerability compromises authentication controls and exposes critical management interfaces, the risk to network integrity and availability is significant. The vulnerability is particularly concerning for organizations relying on Nokia SR Linux for core network infrastructure, as unauthorized access could facilitate lateral movement, persistent access, or denial of service.
Potential Impact
For European organizations, the impact of CVE-2025-0980 could be severe. Unauthorized access to network device management interfaces can lead to manipulation of routing, firewall rules, or other critical configurations, potentially causing network outages or data interception. Telecom operators, internet service providers, and large enterprises using Nokia SR Linux are at heightened risk, as their infrastructure is critical for communications and business continuity. Compromise could also enable attackers to pivot to other internal systems, increasing the scope of damage. Confidentiality is at risk due to potential exposure of sensitive configuration data; integrity is threatened by unauthorized changes; and availability could be impacted by disruptive actions. The absence of known exploits currently provides a window for proactive mitigation, but the vulnerability’s ease of exploitation and critical role of affected systems elevate the threat level. Regulatory compliance in Europe, including GDPR and NIS Directive requirements, may also be impacted if this vulnerability leads to data breaches or service disruptions.
Mitigation Recommendations
Organizations should immediately inventory their network devices to identify Nokia SR Linux instances running affected versions. They must prioritize upgrading to versions 23.10.6, 24.10.2, or later where the vulnerability is patched. Until patches are applied, access to the JSON-RPC service should be strictly limited via network segmentation, firewall rules, or VPNs to trusted administrators only. Implementing strong network access controls and monitoring for unusual JSON-RPC activity can help detect exploitation attempts. Additionally, organizations should review and harden authentication mechanisms and consider disabling unused management interfaces. Regular auditing of device configurations and logs will aid in early detection of unauthorized access. Coordination with Nokia support for guidance and updates is recommended. Finally, integrating this vulnerability into incident response plans will prepare teams for rapid action if exploitation is detected.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Nokia
- Date Reserved
- 2025-02-03T08:49:28.343Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 695e0d1ea55ed4ed99880fd0
Added to database: 1/7/2026, 7:37:02 AM
Last enriched: 1/7/2026, 7:52:43 AM
Last updated: 1/8/2026, 9:20:34 AM
Views: 17
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-0701: SQL Injection in code-projects Intern Membership Management System
MediumCVE-2026-0700: SQL Injection in code-projects Intern Membership Management System
MediumCVE-2025-13679: CWE-862 Missing Authorization in themeum Tutor LMS – eLearning and online course solution
MediumCVE-2026-0699: SQL Injection in code-projects Intern Membership Management System
MediumCVE-2026-0698: SQL Injection in code-projects Intern Membership Management System
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.