Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-10258: Vulnerability in Nokia Infinera DNA

0
Medium
VulnerabilityCVE-2025-10258cvecve-2025-10258
Published: Thu Feb 05 2026 (02/05/2026, 07:13:50 UTC)
Source: CVE Database V5
Vendor/Project: Nokia
Product: Infinera DNA

Description

Infinera DNA is vulnerable to a time-based SQL injection vulnerability due to insufficient input validation, which may result in leaking of sensitive information.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 23:10:44 UTC

Technical Analysis

CVE-2025-10258 identifies a time-based SQL injection vulnerability in Nokia's Infinera DNA product, a network management system used primarily in telecommunications infrastructure. The vulnerability stems from inadequate input validation, which allows an attacker to craft malicious SQL queries that can manipulate the backend database. Specifically, the flaw enables time-based blind SQL injection, where an attacker infers data by measuring response delays caused by injected SQL commands. The attack vector requires network access (AV:A), low attack complexity (AC:L), and low privileges (PR:L), but no user interaction (UI:N). The vulnerability impacts confidentiality (C:H) by potentially exposing sensitive information stored in the database, while integrity remains unaffected (I:N), and availability impact is low (A:L). The affected versions are all releases prior to R24.2. Although no public exploits have been reported, the vulnerability poses a risk to organizations relying on Infinera DNA for network operations. The CWE-89 classification confirms this is a classic SQL injection issue. Due to the critical role of Infinera DNA in managing network elements, exploitation could lead to significant information disclosure, aiding further attacks or espionage. The absence of patches at the time of publication necessitates immediate mitigation steps to reduce risk.

Potential Impact

The primary impact of this vulnerability is unauthorized disclosure of sensitive information from the backend database of Nokia Infinera DNA systems. This can include configuration data, credentials, or operational details critical to network management. Such information leakage can facilitate further attacks, including privilege escalation, lateral movement, or targeted espionage against telecommunications infrastructure. Given the role of Infinera DNA in managing network elements, compromised confidentiality could disrupt service integrity indirectly or expose critical infrastructure details to adversaries. Although the vulnerability does not directly affect data integrity or availability, the exposure of sensitive data can have severe operational and reputational consequences. Organizations worldwide that depend on Infinera DNA for network orchestration and management are at risk, especially those in telecommunications, government, and critical infrastructure sectors. The medium severity rating reflects the balance between the ease of exploitation and the scope of impact, but the strategic importance of affected systems elevates the threat's significance.

Mitigation Recommendations

1. Apply vendor patches and updates as soon as Nokia releases a fix for versions earlier than R24.2. 2. Implement strict input validation and sanitization on all user inputs interacting with the database to prevent SQL injection vectors. 3. Employ web application firewalls (WAFs) with rules specifically designed to detect and block SQL injection attempts, including time-based injection patterns. 4. Restrict network access to Infinera DNA management interfaces using network segmentation, VPNs, and access control lists to limit exposure to trusted users and systems only. 5. Monitor database query logs and network traffic for anomalous delays or patterns indicative of time-based SQL injection attacks. 6. Conduct regular security assessments and penetration testing focused on injection vulnerabilities within network management systems. 7. Educate administrators and security teams about the risks of SQL injection and the importance of timely patching and monitoring. 8. Consider deploying intrusion detection systems (IDS) with signatures for SQL injection to provide early warning of exploitation attempts.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Nokia
Date Reserved
2025-09-11T07:27:04.180Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69844701f9fa50a62f0a303c

Added to database: 2/5/2026, 7:30:09 AM

Last enriched: 2/26/2026, 11:10:44 PM

Last updated: 3/22/2026, 2:03:02 AM

Views: 103

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses