Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11192: CWE-287 Improper Authentication in Extreme Networks Fabric Engine (VOSS)

0
High
VulnerabilityCVE-2025-11192cvecve-2025-11192cwe-287
Published: Tue Oct 07 2025 (10/07/2025, 19:07:45 UTC)
Source: CVE Database V5
Vendor/Project: Extreme Networks
Product: Fabric Engine (VOSS)

Description

A vulnerability in Extreme Networks’ Fabric Engine (VOSS) before 9.3 was discovered. When SD-WAN AutoSense is enabled on a port, it may automatically configure fabric connectivity without validating ISIS authentication settings. The SD-WAN AutoSense implementation may be exploited by malicious actors by allowing unauthorized access to network fabric and configuration data.

AI-Powered Analysis

AILast updated: 10/15/2025, 01:05:37 UTC

Technical Analysis

CVE-2025-11192 is an improper authentication vulnerability (CWE-287) identified in Extreme Networks Fabric Engine (VOSS) prior to version 9.3. The vulnerability specifically affects the SD-WAN AutoSense feature, which when enabled on a port, automatically configures fabric connectivity. However, this process fails to validate ISIS (Intermediate System to Intermediate System) authentication settings, a critical security mechanism designed to authenticate routing protocol peers and protect routing information integrity. Due to this lack of validation, a malicious actor can exploit the vulnerability to gain unauthorized access to the network fabric and potentially sensitive configuration data. The exploit requires no privileges, no user interaction, and can be performed remotely over a network connection (CVSS vector: AV:P/AC:L/PR:N/UI:N). The vulnerability impacts confidentiality, integrity, and availability at a high level, as unauthorized access to fabric configuration can lead to network manipulation, data interception, or denial of service. Although no public exploits are currently known, the severity and ease of exploitation make this a critical concern for affected organizations. The vulnerability was reserved on 2025-09-30 and published on 2025-10-07, with Extreme Networks recommending upgrading to version 9.3 or later where the issue is resolved.

Potential Impact

For European organizations, this vulnerability poses a significant risk to network security, especially for enterprises and service providers relying on Extreme Networks Fabric Engine for SD-WAN and fabric connectivity. Unauthorized access to the network fabric can lead to interception or manipulation of sensitive data, disruption of network services, and potential lateral movement within the network. Critical infrastructure sectors such as finance, telecommunications, energy, and government agencies that deploy Extreme Networks solutions could face operational disruptions and data breaches. The vulnerability's ability to bypass authentication without user interaction increases the likelihood of automated or stealthy attacks. Given the increasing adoption of SD-WAN technologies in Europe to enhance network agility and security, this vulnerability could undermine trust in network infrastructure and complicate compliance with data protection regulations like GDPR if sensitive data is exposed or network availability is impacted.

Mitigation Recommendations

Organizations should immediately verify if they are running Extreme Networks Fabric Engine (VOSS) versions prior to 9.3 with SD-WAN AutoSense enabled. The primary mitigation is to upgrade to version 9.3 or later, where the vulnerability has been addressed by enforcing proper ISIS authentication validation. Until upgrades can be applied, administrators should consider disabling SD-WAN AutoSense on all ports to prevent automatic fabric connectivity configuration without authentication checks. Additionally, network segmentation and strict access controls should be implemented to limit exposure of management interfaces and fabric components. Monitoring network traffic for unusual ISIS protocol activity and unauthorized configuration changes can help detect exploitation attempts. Regular audits of network device configurations and firmware versions should be conducted to ensure compliance with security policies. Finally, organizations should engage with Extreme Networks support for any available patches or workarounds and stay informed about any emerging exploit reports.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
ExtremeNetworks
Date Reserved
2025-09-30T13:38:06.105Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68e566d0a677756fc99d8dba

Added to database: 10/7/2025, 7:15:28 PM

Last enriched: 10/15/2025, 1:05:37 AM

Last updated: 11/23/2025, 7:12:05 PM

Views: 29

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats