Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-26487: CWE-918 Server-Side Request Forgery (SSRF) in Infinera MTC-9

0
High
VulnerabilityCVE-2025-26487cvecve-2025-26487cwe-918
Published: Mon Dec 08 2025 (12/08/2025, 08:44:34 UTC)
Source: CVE Database V5
Vendor/Project: Infinera
Product: MTC-9

Description

Server-Side Request Forgery (SSRF) vulnerability in Infinera MTC-9 version allows remote unauthenticated users to gain access to other network resources using HTTPS requests through the appliance used as a bridge.

AI-Powered Analysis

AILast updated: 12/08/2025, 09:13:20 UTC

Technical Analysis

CVE-2025-26487 is a Server-Side Request Forgery (SSRF) vulnerability classified under CWE-918, found in the Infinera MTC-9 product version R22.1.1.0275. SSRF vulnerabilities occur when an attacker can manipulate a server to send crafted requests to unintended locations, often internal or protected network resources, bypassing firewall restrictions. This particular vulnerability allows unauthenticated remote attackers to induce the vulnerable server to initiate arbitrary network requests. The CVSS 3.1 vector (AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N) indicates network attack vector, low attack complexity, no privileges or user interaction required, and a scope change, with high confidentiality impact but no impact on integrity or availability. The vulnerability was reserved in February 2025 and published in December 2025, with no patches currently linked, and no known exploits in the wild. The affected product, Infinera MTC-9, is a telecommunications platform used in optical transport networks, making this vulnerability particularly critical for telecom operators. Exploitation could allow attackers to access internal services, potentially leading to data leakage or further network compromise. The lack of authentication and user interaction requirements significantly lowers the barrier for exploitation. The scope change means the vulnerability affects resources beyond the initially vulnerable component, increasing risk.

Potential Impact

For European organizations, especially telecom operators and network service providers using Infinera MTC-9 systems, this SSRF vulnerability poses a significant risk. Exploitation could allow attackers to access internal network resources that are otherwise protected, potentially exposing sensitive data or enabling lateral movement within critical infrastructure. Confidentiality breaches could impact customer data, network configurations, or proprietary information. Given the role of Infinera MTC-9 in optical transport networks, disruption or data leakage could affect service availability indirectly by enabling further attacks. The vulnerability’s ease of exploitation without authentication increases the likelihood of targeted attacks or opportunistic scanning. This could undermine trust in telecom providers and impact compliance with European data protection regulations such as GDPR. The potential for attackers to pivot from the SSRF to more damaging exploits elevates the threat to national critical infrastructure and commercial enterprises relying on these networks.

Mitigation Recommendations

1. Monitor Infinera’s official channels closely for security patches addressing CVE-2025-26487 and apply them immediately upon release. 2. Implement strict egress filtering on network devices to restrict outbound requests from the MTC-9 system to only trusted and necessary destinations, minimizing SSRF exploitation scope. 3. Use network segmentation to isolate management interfaces and internal services from the broader network, reducing accessible attack surface. 4. Employ Web Application Firewalls (WAFs) or intrusion detection/prevention systems (IDS/IPS) with SSRF detection capabilities to identify and block suspicious request patterns. 5. Conduct regular security assessments and penetration testing focused on SSRF and related vulnerabilities in telecom infrastructure. 6. Review and harden server-side request handling logic and input validation where possible, even if patches are not yet available. 7. Maintain comprehensive logging and monitoring to detect anomalous outbound requests originating from the MTC-9 system. 8. Coordinate with national cybersecurity agencies for threat intelligence sharing and incident response preparedness.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
ENISA
Date Reserved
2025-02-11T08:24:51.661Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69369326ddfbd9e35f933089

Added to database: 12/8/2025, 8:58:14 AM

Last enriched: 12/8/2025, 9:13:20 AM

Last updated: 12/10/2025, 1:48:10 PM

Views: 57

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats