CVE-2025-11192: CWE-287 Improper Authentication in Extreme Networks Fabric Engine (VOSS)
A vulnerability in Extreme Networks’ Fabric Engine (VOSS) before 9.3 was discovered. When SD-WAN AutoSense is enabled on a port, it may automatically configure fabric connectivity without validating ISIS authentication settings. The SD-WAN AutoSense implementation may be exploited by malicious actors by allowing unauthorized access to network fabric and configuration data.
AI Analysis
Technical Summary
CVE-2025-11192 is an improper authentication vulnerability (CWE-287) identified in Extreme Networks Fabric Engine (VOSS) prior to version 9.3. The vulnerability specifically affects the SD-WAN AutoSense feature, which when enabled on a port, automatically configures fabric connectivity. However, this process fails to validate ISIS (Intermediate System to Intermediate System) authentication settings, a critical security mechanism designed to authenticate routing protocol peers and protect routing information integrity. Due to this lack of validation, a malicious actor can exploit the vulnerability to gain unauthorized access to the network fabric and potentially sensitive configuration data. The exploit requires no privileges, no user interaction, and can be performed remotely over a network connection (CVSS vector: AV:P/AC:L/PR:N/UI:N). The vulnerability impacts confidentiality, integrity, and availability at a high level, as unauthorized access to fabric configuration can lead to network manipulation, data interception, or denial of service. Although no public exploits are currently known, the severity and ease of exploitation make this a critical concern for affected organizations. The vulnerability was reserved on 2025-09-30 and published on 2025-10-07, with Extreme Networks recommending upgrading to version 9.3 or later where the issue is resolved.
Potential Impact
For European organizations, this vulnerability poses a significant risk to network security, especially for enterprises and service providers relying on Extreme Networks Fabric Engine for SD-WAN and fabric connectivity. Unauthorized access to the network fabric can lead to interception or manipulation of sensitive data, disruption of network services, and potential lateral movement within the network. Critical infrastructure sectors such as finance, telecommunications, energy, and government agencies that deploy Extreme Networks solutions could face operational disruptions and data breaches. The vulnerability's ability to bypass authentication without user interaction increases the likelihood of automated or stealthy attacks. Given the increasing adoption of SD-WAN technologies in Europe to enhance network agility and security, this vulnerability could undermine trust in network infrastructure and complicate compliance with data protection regulations like GDPR if sensitive data is exposed or network availability is impacted.
Mitigation Recommendations
Organizations should immediately verify if they are running Extreme Networks Fabric Engine (VOSS) versions prior to 9.3 with SD-WAN AutoSense enabled. The primary mitigation is to upgrade to version 9.3 or later, where the vulnerability has been addressed by enforcing proper ISIS authentication validation. Until upgrades can be applied, administrators should consider disabling SD-WAN AutoSense on all ports to prevent automatic fabric connectivity configuration without authentication checks. Additionally, network segmentation and strict access controls should be implemented to limit exposure of management interfaces and fabric components. Monitoring network traffic for unusual ISIS protocol activity and unauthorized configuration changes can help detect exploitation attempts. Regular audits of network device configurations and firmware versions should be conducted to ensure compliance with security policies. Finally, organizations should engage with Extreme Networks support for any available patches or workarounds and stay informed about any emerging exploit reports.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Belgium, Poland
CVE-2025-11192: CWE-287 Improper Authentication in Extreme Networks Fabric Engine (VOSS)
Description
A vulnerability in Extreme Networks’ Fabric Engine (VOSS) before 9.3 was discovered. When SD-WAN AutoSense is enabled on a port, it may automatically configure fabric connectivity without validating ISIS authentication settings. The SD-WAN AutoSense implementation may be exploited by malicious actors by allowing unauthorized access to network fabric and configuration data.
AI-Powered Analysis
Technical Analysis
CVE-2025-11192 is an improper authentication vulnerability (CWE-287) identified in Extreme Networks Fabric Engine (VOSS) prior to version 9.3. The vulnerability specifically affects the SD-WAN AutoSense feature, which when enabled on a port, automatically configures fabric connectivity. However, this process fails to validate ISIS (Intermediate System to Intermediate System) authentication settings, a critical security mechanism designed to authenticate routing protocol peers and protect routing information integrity. Due to this lack of validation, a malicious actor can exploit the vulnerability to gain unauthorized access to the network fabric and potentially sensitive configuration data. The exploit requires no privileges, no user interaction, and can be performed remotely over a network connection (CVSS vector: AV:P/AC:L/PR:N/UI:N). The vulnerability impacts confidentiality, integrity, and availability at a high level, as unauthorized access to fabric configuration can lead to network manipulation, data interception, or denial of service. Although no public exploits are currently known, the severity and ease of exploitation make this a critical concern for affected organizations. The vulnerability was reserved on 2025-09-30 and published on 2025-10-07, with Extreme Networks recommending upgrading to version 9.3 or later where the issue is resolved.
Potential Impact
For European organizations, this vulnerability poses a significant risk to network security, especially for enterprises and service providers relying on Extreme Networks Fabric Engine for SD-WAN and fabric connectivity. Unauthorized access to the network fabric can lead to interception or manipulation of sensitive data, disruption of network services, and potential lateral movement within the network. Critical infrastructure sectors such as finance, telecommunications, energy, and government agencies that deploy Extreme Networks solutions could face operational disruptions and data breaches. The vulnerability's ability to bypass authentication without user interaction increases the likelihood of automated or stealthy attacks. Given the increasing adoption of SD-WAN technologies in Europe to enhance network agility and security, this vulnerability could undermine trust in network infrastructure and complicate compliance with data protection regulations like GDPR if sensitive data is exposed or network availability is impacted.
Mitigation Recommendations
Organizations should immediately verify if they are running Extreme Networks Fabric Engine (VOSS) versions prior to 9.3 with SD-WAN AutoSense enabled. The primary mitigation is to upgrade to version 9.3 or later, where the vulnerability has been addressed by enforcing proper ISIS authentication validation. Until upgrades can be applied, administrators should consider disabling SD-WAN AutoSense on all ports to prevent automatic fabric connectivity configuration without authentication checks. Additionally, network segmentation and strict access controls should be implemented to limit exposure of management interfaces and fabric components. Monitoring network traffic for unusual ISIS protocol activity and unauthorized configuration changes can help detect exploitation attempts. Regular audits of network device configurations and firmware versions should be conducted to ensure compliance with security policies. Finally, organizations should engage with Extreme Networks support for any available patches or workarounds and stay informed about any emerging exploit reports.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- ExtremeNetworks
- Date Reserved
- 2025-09-30T13:38:06.105Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68e566d0a677756fc99d8dba
Added to database: 10/7/2025, 7:15:28 PM
Last enriched: 10/15/2025, 1:05:37 AM
Last updated: 1/8/2026, 2:30:23 PM
Views: 47
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-21895: CWE-703: Improper Check or Handling of Exceptional Conditions in RustCrypto RSA
LowCVE-2025-8307: CWE-257 Storing Passwords in a Recoverable Format in Asseco InfoMedica Plus
MediumCVE-2025-8306: CWE-1220 Insufficient Granularity of Access Control in Asseco InfoMedica Plus
MediumCVE-2025-14025: Incorrect Execution-Assigned Permissions in Red Hat Red Hat Ansible Automation Platform 2
HighCVE-2026-21891: CWE-287: Improper Authentication in IceWhaleTech ZimaOS
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.