CVE-2025-0980: Vulnerability in Nokia SR Linux
CVE-2025-0980 is an authentication vulnerability in Nokia SR Linux affecting versions prior to 23. 10. 6 and 24. 10. 2. It allows unauthorized access to the JSON-RPC service due to improper validation, enabling attackers to bypass authentication. The vulnerability has a CVSS score of 6. 4, indicating medium severity, with high impact on confidentiality, integrity, and availability but requiring local access with high privileges. No known exploits are currently reported in the wild. European organizations using Nokia SR Linux for network infrastructure could face risks of unauthorized control or data exposure.
AI Analysis
Technical Summary
CVE-2025-0980 identifies a critical authentication bypass vulnerability in Nokia SR Linux, a network operating system used primarily in routing and switching infrastructure. The flaw resides in the JSON-RPC service, which is designed to allow remote procedure calls via JSON messages. Due to invalid validation logic, the service permits access without requiring valid authentication credentials, effectively allowing unauthorized users to interact with the system's management interface. The affected versions are all releases prior to 23.10.6 and 24.10.2, indicating that the issue was addressed in these updates. The vulnerability is classified under CWE-284 (Improper Access Control), highlighting a failure to enforce proper authentication checks. The CVSS v3.1 score of 6.4 reflects a medium severity rating, with the vector indicating that exploitation requires local access (AV:L), high attack complexity (AC:H), and high privileges (PR:H), but no user interaction (UI:N). The impact on confidentiality, integrity, and availability is high, meaning successful exploitation could lead to full compromise of the device's management functions. Although no exploits have been reported in the wild, the potential for unauthorized control over critical network infrastructure poses a significant risk. The vulnerability's presence in a core network OS used by telecom operators and enterprises underscores the importance of timely remediation.
Potential Impact
For European organizations, especially telecommunications providers and large enterprises relying on Nokia SR Linux for network routing and switching, this vulnerability could lead to unauthorized access to critical network management interfaces. Exploitation could allow attackers to manipulate routing configurations, intercept or redirect traffic, or disrupt network availability, severely impacting business operations and service continuity. Confidential data traversing these networks could be exposed or altered, undermining data privacy and regulatory compliance such as GDPR. The requirement for local access and high privileges somewhat limits remote exploitation but insider threats or lateral movement by attackers within the network could leverage this flaw. The absence of known exploits reduces immediate risk but does not eliminate the threat, as attackers may develop exploits once the vulnerability details are widely known. Disruption of telecommunications infrastructure in key European markets could have cascading effects on other critical sectors dependent on network availability.
Mitigation Recommendations
Organizations should prioritize upgrading Nokia SR Linux installations to versions 23.10.6 or 24.10.2 and later, where the vulnerability has been addressed. Until patches are applied, restrict access to the JSON-RPC service by implementing strict network segmentation and firewall rules to limit connections only to trusted management hosts. Employ strong access controls and monitoring on devices running SR Linux to detect any unauthorized access attempts. Conduct regular audits of network device configurations and access logs to identify suspicious activity. Additionally, implement multi-factor authentication and role-based access controls for network management interfaces to reduce the risk of privilege escalation. Consider deploying intrusion detection systems capable of recognizing anomalous JSON-RPC traffic patterns. Finally, maintain an incident response plan tailored to network infrastructure compromise scenarios to ensure rapid containment if exploitation occurs.
Affected Countries
Germany, France, United Kingdom, Sweden, Finland, Norway, Netherlands, Italy, Spain
CVE-2025-0980: Vulnerability in Nokia SR Linux
Description
CVE-2025-0980 is an authentication vulnerability in Nokia SR Linux affecting versions prior to 23. 10. 6 and 24. 10. 2. It allows unauthorized access to the JSON-RPC service due to improper validation, enabling attackers to bypass authentication. The vulnerability has a CVSS score of 6. 4, indicating medium severity, with high impact on confidentiality, integrity, and availability but requiring local access with high privileges. No known exploits are currently reported in the wild. European organizations using Nokia SR Linux for network infrastructure could face risks of unauthorized control or data exposure.
AI-Powered Analysis
Technical Analysis
CVE-2025-0980 identifies a critical authentication bypass vulnerability in Nokia SR Linux, a network operating system used primarily in routing and switching infrastructure. The flaw resides in the JSON-RPC service, which is designed to allow remote procedure calls via JSON messages. Due to invalid validation logic, the service permits access without requiring valid authentication credentials, effectively allowing unauthorized users to interact with the system's management interface. The affected versions are all releases prior to 23.10.6 and 24.10.2, indicating that the issue was addressed in these updates. The vulnerability is classified under CWE-284 (Improper Access Control), highlighting a failure to enforce proper authentication checks. The CVSS v3.1 score of 6.4 reflects a medium severity rating, with the vector indicating that exploitation requires local access (AV:L), high attack complexity (AC:H), and high privileges (PR:H), but no user interaction (UI:N). The impact on confidentiality, integrity, and availability is high, meaning successful exploitation could lead to full compromise of the device's management functions. Although no exploits have been reported in the wild, the potential for unauthorized control over critical network infrastructure poses a significant risk. The vulnerability's presence in a core network OS used by telecom operators and enterprises underscores the importance of timely remediation.
Potential Impact
For European organizations, especially telecommunications providers and large enterprises relying on Nokia SR Linux for network routing and switching, this vulnerability could lead to unauthorized access to critical network management interfaces. Exploitation could allow attackers to manipulate routing configurations, intercept or redirect traffic, or disrupt network availability, severely impacting business operations and service continuity. Confidential data traversing these networks could be exposed or altered, undermining data privacy and regulatory compliance such as GDPR. The requirement for local access and high privileges somewhat limits remote exploitation but insider threats or lateral movement by attackers within the network could leverage this flaw. The absence of known exploits reduces immediate risk but does not eliminate the threat, as attackers may develop exploits once the vulnerability details are widely known. Disruption of telecommunications infrastructure in key European markets could have cascading effects on other critical sectors dependent on network availability.
Mitigation Recommendations
Organizations should prioritize upgrading Nokia SR Linux installations to versions 23.10.6 or 24.10.2 and later, where the vulnerability has been addressed. Until patches are applied, restrict access to the JSON-RPC service by implementing strict network segmentation and firewall rules to limit connections only to trusted management hosts. Employ strong access controls and monitoring on devices running SR Linux to detect any unauthorized access attempts. Conduct regular audits of network device configurations and access logs to identify suspicious activity. Additionally, implement multi-factor authentication and role-based access controls for network management interfaces to reduce the risk of privilege escalation. Consider deploying intrusion detection systems capable of recognizing anomalous JSON-RPC traffic patterns. Finally, maintain an incident response plan tailored to network infrastructure compromise scenarios to ensure rapid containment if exploitation occurs.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Nokia
- Date Reserved
- 2025-02-03T08:49:28.343Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 695e0d1ea55ed4ed99880fd0
Added to database: 1/7/2026, 7:37:02 AM
Last enriched: 1/14/2026, 3:58:38 PM
Last updated: 2/7/2026, 1:39:58 AM
Views: 73
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2071: Buffer Overflow in UTT 进取 520W
HighCVE-2026-25762: CWE-400: Uncontrolled Resource Consumption in adonisjs core
HighCVE-2026-25754: CWE-1321: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') in adonisjs core
HighCVE-2026-25644: CWE-295: Improper Certificate Validation in datahub-project datahub
HighCVE-2026-25804: CWE-287: Improper Authentication in antrea-io antrea
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.