Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-10258: Vulnerability in Nokia Infinera DNA

0
Unknown
VulnerabilityCVE-2025-10258cvecve-2025-10258
Published: Thu Feb 05 2026 (02/05/2026, 07:13:50 UTC)
Source: CVE Database V5
Vendor/Project: Nokia
Product: Infinera DNA

Description

Infinera DNA is vulnerable to a time-based SQL injection vulnerability due to insufficient input validation, which may result in leaking of sensitive information.

AI-Powered Analysis

AILast updated: 02/05/2026, 07:44:31 UTC

Technical Analysis

CVE-2025-10258 identifies a time-based SQL injection vulnerability in Nokia's Infinera DNA platform, a network management and orchestration software widely used in telecommunications infrastructure. The vulnerability stems from insufficient input validation on user-supplied data, which allows attackers to inject malicious SQL commands that cause the database to delay responses based on injected conditions. This time-based technique enables attackers to infer sensitive information from the database by measuring response times, effectively leaking data without direct error messages. The affected versions include all releases prior to R24.2, with no CVSS score assigned yet. Exploitation does not require authentication or user interaction, making it remotely exploitable by unauthenticated attackers. While no known exploits have been reported in the wild, the vulnerability could be leveraged to extract sensitive configuration, credentials, or operational data, potentially leading to further compromise or disruption of network services. The lack of patches currently linked in the report suggests that organizations must rely on vendor updates or mitigations once available. Given the critical role of Infinera DNA in managing network infrastructure, exploitation could impact confidentiality and integrity of data, and potentially availability if attackers manipulate backend systems. The vulnerability highlights the importance of rigorous input validation and secure coding practices in network management platforms.

Potential Impact

For European organizations, the impact of CVE-2025-10258 could be significant due to the widespread use of Nokia's Infinera DNA in telecommunications and critical infrastructure networks. Successful exploitation could lead to unauthorized disclosure of sensitive network configuration data, user credentials, or operational parameters, undermining confidentiality. This could facilitate further attacks such as privilege escalation, lateral movement, or disruption of network services, impacting availability and integrity. Telecommunications providers, internet service providers, and enterprises relying on Nokia infrastructure could face service outages, regulatory penalties under GDPR for data breaches, and reputational damage. The vulnerability's remote and unauthenticated exploitability increases the attack surface, making it attractive for threat actors targeting European critical infrastructure. Additionally, given the strategic importance of telecommunications in Europe, exploitation could have cascading effects on national security and economic stability. Organizations may also face compliance challenges if they fail to remediate promptly. The absence of known exploits currently provides a window for proactive defense, but the risk remains high due to the nature of the vulnerability.

Mitigation Recommendations

1. Immediately upgrade Nokia Infinera DNA to version R24.2 or later once available, as this version addresses the vulnerability. 2. Until patching is possible, implement strict input validation and sanitization on all user inputs interacting with the database to prevent injection attacks. 3. Employ Web Application Firewalls (WAFs) or database activity monitoring tools configured to detect and block anomalous SQL queries, especially those exhibiting time-based injection patterns. 4. Restrict network access to the Infinera DNA management interfaces to trusted IP addresses and enforce strong authentication and authorization controls. 5. Conduct regular security audits and penetration testing focused on input validation and injection vulnerabilities within network management systems. 6. Monitor logs and network traffic for unusual delays or patterns indicative of time-based SQL injection attempts. 7. Engage with Nokia support and subscribe to security advisories to receive timely updates and patches. 8. Develop an incident response plan specifically addressing potential exploitation of network management platforms to minimize impact if an attack occurs.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Nokia
Date Reserved
2025-09-11T07:27:04.180Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69844701f9fa50a62f0a303c

Added to database: 2/5/2026, 7:30:09 AM

Last enriched: 2/5/2026, 7:44:31 AM

Last updated: 2/5/2026, 9:48:53 AM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats