Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11192: CWE-287 Improper Authentication in Extreme Networks Fabric Engine (VOSS)

0
High
VulnerabilityCVE-2025-11192cvecve-2025-11192cwe-287
Published: Tue Oct 07 2025 (10/07/2025, 19:07:45 UTC)
Source: CVE Database V5
Vendor/Project: Extreme Networks
Product: Fabric Engine (VOSS)

Description

A vulnerability in Extreme Networks’ Fabric Engine (VOSS) before 9.3 was discovered. When SD-WAN AutoSense is enabled on a port, it may automatically configure fabric connectivity without validating ISIS authentication settings. The SD-WAN AutoSense implementation may be exploited by malicious actors by allowing unauthorized access to network fabric and configuration data.

AI-Powered Analysis

AILast updated: 10/07/2025, 19:30:35 UTC

Technical Analysis

CVE-2025-11192 is an improper authentication vulnerability (CWE-287) identified in Extreme Networks Fabric Engine (VOSS) prior to version 9.3. The vulnerability arises when the SD-WAN AutoSense feature is enabled on a network port. This feature is designed to automatically configure fabric connectivity to simplify network management. However, it fails to validate ISIS (Intermediate System to Intermediate System) authentication settings during this process. ISIS is a routing protocol used in many enterprise and service provider networks to exchange routing information securely. The lack of authentication validation means that an attacker can exploit the AutoSense mechanism to gain unauthorized access to the network fabric, potentially viewing or modifying configuration data. The vulnerability has a CVSS 4.0 base score of 8.4, indicating high severity. The vector shows that exploitation requires physical or local network access (AV:P), but no privileges or user interaction are needed, and the attack complexity is low. The vulnerability impacts confidentiality, integrity, and availability at a high level, with a wide scope affecting the entire network fabric. No public exploits are known yet, but the risk is significant given the critical role of network fabric in enterprise and service provider environments. The vulnerability was reserved on 2025-09-30 and published on 2025-10-07. No patches were linked at the time of publication, but upgrading to version 9.3 or later is expected to remediate the issue.

Potential Impact

For European organizations, this vulnerability poses a serious risk to network infrastructure security. Unauthorized access to the network fabric can lead to interception or manipulation of sensitive data, disruption of network services, and potential lateral movement within the network. Enterprises relying on Extreme Networks Fabric Engine for SD-WAN or fabric connectivity may face confidentiality breaches, integrity violations through unauthorized configuration changes, and availability issues if attackers disrupt routing or fabric operations. Critical sectors such as finance, telecommunications, government, and utilities in Europe could experience operational disruptions and data compromise. The vulnerability’s exploitation could undermine trust in network reliability and lead to regulatory and compliance consequences under GDPR and other frameworks. The lack of authentication validation in a core network component increases the attack surface for insider threats or attackers with local network access, which is a common scenario in complex enterprise environments.

Mitigation Recommendations

Immediate mitigation involves disabling the SD-WAN AutoSense feature on all affected ports to prevent automatic fabric connectivity configuration without authentication validation. Network administrators should audit current configurations to identify enabled AutoSense ports and restrict access to management interfaces. Applying network segmentation and strict access controls to limit local network access can reduce exploitation risk. Monitoring network traffic for unusual ISIS protocol activity or unauthorized configuration changes can help detect attempted exploitation. Organizations should plan to upgrade to Extreme Networks Fabric Engine version 9.3 or later as soon as it becomes available, as this version addresses the vulnerability. Until patches are applied, consider deploying compensating controls such as enhanced network monitoring, multi-factor authentication for network management, and strict physical security to limit attacker access. Vendor communication channels should be monitored for official patches and advisories. Incident response plans should be updated to address potential exploitation scenarios involving network fabric compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
ExtremeNetworks
Date Reserved
2025-09-30T13:38:06.105Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68e566d0a677756fc99d8dba

Added to database: 10/7/2025, 7:15:28 PM

Last enriched: 10/7/2025, 7:30:35 PM

Last updated: 10/9/2025, 4:15:22 PM

Views: 12

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats