CVE-2025-11192: CWE-287 Improper Authentication in Extreme Networks Fabric Engine (VOSS)
A vulnerability in Extreme Networks’ Fabric Engine (VOSS) before 9.3 was discovered. When SD-WAN AutoSense is enabled on a port, it may automatically configure fabric connectivity without validating ISIS authentication settings. The SD-WAN AutoSense implementation may be exploited by malicious actors by allowing unauthorized access to network fabric and configuration data.
AI Analysis
Technical Summary
CVE-2025-11192 is an improper authentication vulnerability (CWE-287) identified in Extreme Networks Fabric Engine (VOSS) prior to version 9.3. The vulnerability specifically affects the SD-WAN AutoSense feature, which when enabled on a port, automatically configures fabric connectivity. However, this process fails to validate ISIS (Intermediate System to Intermediate System) authentication settings, a critical security mechanism designed to authenticate routing protocol peers and protect routing information integrity. Due to this lack of validation, a malicious actor can exploit the vulnerability to gain unauthorized access to the network fabric and potentially sensitive configuration data. The exploit requires no privileges, no user interaction, and can be performed remotely over a network connection (CVSS vector: AV:P/AC:L/PR:N/UI:N). The vulnerability impacts confidentiality, integrity, and availability at a high level, as unauthorized access to fabric configuration can lead to network manipulation, data interception, or denial of service. Although no public exploits are currently known, the severity and ease of exploitation make this a critical concern for affected organizations. The vulnerability was reserved on 2025-09-30 and published on 2025-10-07, with Extreme Networks recommending upgrading to version 9.3 or later where the issue is resolved.
Potential Impact
For European organizations, this vulnerability poses a significant risk to network security, especially for enterprises and service providers relying on Extreme Networks Fabric Engine for SD-WAN and fabric connectivity. Unauthorized access to the network fabric can lead to interception or manipulation of sensitive data, disruption of network services, and potential lateral movement within the network. Critical infrastructure sectors such as finance, telecommunications, energy, and government agencies that deploy Extreme Networks solutions could face operational disruptions and data breaches. The vulnerability's ability to bypass authentication without user interaction increases the likelihood of automated or stealthy attacks. Given the increasing adoption of SD-WAN technologies in Europe to enhance network agility and security, this vulnerability could undermine trust in network infrastructure and complicate compliance with data protection regulations like GDPR if sensitive data is exposed or network availability is impacted.
Mitigation Recommendations
Organizations should immediately verify if they are running Extreme Networks Fabric Engine (VOSS) versions prior to 9.3 with SD-WAN AutoSense enabled. The primary mitigation is to upgrade to version 9.3 or later, where the vulnerability has been addressed by enforcing proper ISIS authentication validation. Until upgrades can be applied, administrators should consider disabling SD-WAN AutoSense on all ports to prevent automatic fabric connectivity configuration without authentication checks. Additionally, network segmentation and strict access controls should be implemented to limit exposure of management interfaces and fabric components. Monitoring network traffic for unusual ISIS protocol activity and unauthorized configuration changes can help detect exploitation attempts. Regular audits of network device configurations and firmware versions should be conducted to ensure compliance with security policies. Finally, organizations should engage with Extreme Networks support for any available patches or workarounds and stay informed about any emerging exploit reports.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Belgium, Poland
CVE-2025-11192: CWE-287 Improper Authentication in Extreme Networks Fabric Engine (VOSS)
Description
A vulnerability in Extreme Networks’ Fabric Engine (VOSS) before 9.3 was discovered. When SD-WAN AutoSense is enabled on a port, it may automatically configure fabric connectivity without validating ISIS authentication settings. The SD-WAN AutoSense implementation may be exploited by malicious actors by allowing unauthorized access to network fabric and configuration data.
AI-Powered Analysis
Technical Analysis
CVE-2025-11192 is an improper authentication vulnerability (CWE-287) identified in Extreme Networks Fabric Engine (VOSS) prior to version 9.3. The vulnerability specifically affects the SD-WAN AutoSense feature, which when enabled on a port, automatically configures fabric connectivity. However, this process fails to validate ISIS (Intermediate System to Intermediate System) authentication settings, a critical security mechanism designed to authenticate routing protocol peers and protect routing information integrity. Due to this lack of validation, a malicious actor can exploit the vulnerability to gain unauthorized access to the network fabric and potentially sensitive configuration data. The exploit requires no privileges, no user interaction, and can be performed remotely over a network connection (CVSS vector: AV:P/AC:L/PR:N/UI:N). The vulnerability impacts confidentiality, integrity, and availability at a high level, as unauthorized access to fabric configuration can lead to network manipulation, data interception, or denial of service. Although no public exploits are currently known, the severity and ease of exploitation make this a critical concern for affected organizations. The vulnerability was reserved on 2025-09-30 and published on 2025-10-07, with Extreme Networks recommending upgrading to version 9.3 or later where the issue is resolved.
Potential Impact
For European organizations, this vulnerability poses a significant risk to network security, especially for enterprises and service providers relying on Extreme Networks Fabric Engine for SD-WAN and fabric connectivity. Unauthorized access to the network fabric can lead to interception or manipulation of sensitive data, disruption of network services, and potential lateral movement within the network. Critical infrastructure sectors such as finance, telecommunications, energy, and government agencies that deploy Extreme Networks solutions could face operational disruptions and data breaches. The vulnerability's ability to bypass authentication without user interaction increases the likelihood of automated or stealthy attacks. Given the increasing adoption of SD-WAN technologies in Europe to enhance network agility and security, this vulnerability could undermine trust in network infrastructure and complicate compliance with data protection regulations like GDPR if sensitive data is exposed or network availability is impacted.
Mitigation Recommendations
Organizations should immediately verify if they are running Extreme Networks Fabric Engine (VOSS) versions prior to 9.3 with SD-WAN AutoSense enabled. The primary mitigation is to upgrade to version 9.3 or later, where the vulnerability has been addressed by enforcing proper ISIS authentication validation. Until upgrades can be applied, administrators should consider disabling SD-WAN AutoSense on all ports to prevent automatic fabric connectivity configuration without authentication checks. Additionally, network segmentation and strict access controls should be implemented to limit exposure of management interfaces and fabric components. Monitoring network traffic for unusual ISIS protocol activity and unauthorized configuration changes can help detect exploitation attempts. Regular audits of network device configurations and firmware versions should be conducted to ensure compliance with security policies. Finally, organizations should engage with Extreme Networks support for any available patches or workarounds and stay informed about any emerging exploit reports.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- ExtremeNetworks
- Date Reserved
- 2025-09-30T13:38:06.105Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68e566d0a677756fc99d8dba
Added to database: 10/7/2025, 7:15:28 PM
Last enriched: 10/15/2025, 1:05:37 AM
Last updated: 11/23/2025, 7:12:05 PM
Views: 29
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-13564: Denial of Service in SourceCodester Pre-School Management System
MediumCVE-2025-13562: Command Injection in D-Link DIR-852
MediumCVE-2025-13561: SQL Injection in SourceCodester Company Website CMS
MediumCVE-2025-54515: CWE-1284 Improper Validation of Specified Quantity in Input in AMD Versal™ Adaptive SoC Devices
LowCVE-2025-48507: CWE-1284 Improper Validation of Specified Quantity in Input in AMD Kria™ SOM
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.