CVE-2025-26487: CWE-918 Server-Side Request Forgery (SSRF) in Infinera MTC-9
Server-Side Request Forgery (SSRF) vulnerability in Infinera MTC-9 version allows remote unauthenticated users to gain access to other network resources using HTTPS requests through the appliance used as a bridge.
AI Analysis
Technical Summary
CVE-2025-26487 is a Server-Side Request Forgery (SSRF) vulnerability classified under CWE-918, found in the Infinera MTC-9 product version R22.1.1.0275. SSRF vulnerabilities occur when an attacker can manipulate a server to send crafted requests to unintended locations, often internal or protected network resources, bypassing firewall restrictions. This particular vulnerability allows unauthenticated remote attackers to induce the vulnerable server to initiate arbitrary network requests. The CVSS 3.1 vector (AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N) indicates network attack vector, low attack complexity, no privileges or user interaction required, and a scope change, with high confidentiality impact but no impact on integrity or availability. The vulnerability was reserved in February 2025 and published in December 2025, with no patches currently linked, and no known exploits in the wild. The affected product, Infinera MTC-9, is a telecommunications platform used in optical transport networks, making this vulnerability particularly critical for telecom operators. Exploitation could allow attackers to access internal services, potentially leading to data leakage or further network compromise. The lack of authentication and user interaction requirements significantly lowers the barrier for exploitation. The scope change means the vulnerability affects resources beyond the initially vulnerable component, increasing risk.
Potential Impact
For European organizations, especially telecom operators and network service providers using Infinera MTC-9 systems, this SSRF vulnerability poses a significant risk. Exploitation could allow attackers to access internal network resources that are otherwise protected, potentially exposing sensitive data or enabling lateral movement within critical infrastructure. Confidentiality breaches could impact customer data, network configurations, or proprietary information. Given the role of Infinera MTC-9 in optical transport networks, disruption or data leakage could affect service availability indirectly by enabling further attacks. The vulnerability’s ease of exploitation without authentication increases the likelihood of targeted attacks or opportunistic scanning. This could undermine trust in telecom providers and impact compliance with European data protection regulations such as GDPR. The potential for attackers to pivot from the SSRF to more damaging exploits elevates the threat to national critical infrastructure and commercial enterprises relying on these networks.
Mitigation Recommendations
1. Monitor Infinera’s official channels closely for security patches addressing CVE-2025-26487 and apply them immediately upon release. 2. Implement strict egress filtering on network devices to restrict outbound requests from the MTC-9 system to only trusted and necessary destinations, minimizing SSRF exploitation scope. 3. Use network segmentation to isolate management interfaces and internal services from the broader network, reducing accessible attack surface. 4. Employ Web Application Firewalls (WAFs) or intrusion detection/prevention systems (IDS/IPS) with SSRF detection capabilities to identify and block suspicious request patterns. 5. Conduct regular security assessments and penetration testing focused on SSRF and related vulnerabilities in telecom infrastructure. 6. Review and harden server-side request handling logic and input validation where possible, even if patches are not yet available. 7. Maintain comprehensive logging and monitoring to detect anomalous outbound requests originating from the MTC-9 system. 8. Coordinate with national cybersecurity agencies for threat intelligence sharing and incident response preparedness.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands
CVE-2025-26487: CWE-918 Server-Side Request Forgery (SSRF) in Infinera MTC-9
Description
Server-Side Request Forgery (SSRF) vulnerability in Infinera MTC-9 version allows remote unauthenticated users to gain access to other network resources using HTTPS requests through the appliance used as a bridge.
AI-Powered Analysis
Technical Analysis
CVE-2025-26487 is a Server-Side Request Forgery (SSRF) vulnerability classified under CWE-918, found in the Infinera MTC-9 product version R22.1.1.0275. SSRF vulnerabilities occur when an attacker can manipulate a server to send crafted requests to unintended locations, often internal or protected network resources, bypassing firewall restrictions. This particular vulnerability allows unauthenticated remote attackers to induce the vulnerable server to initiate arbitrary network requests. The CVSS 3.1 vector (AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N) indicates network attack vector, low attack complexity, no privileges or user interaction required, and a scope change, with high confidentiality impact but no impact on integrity or availability. The vulnerability was reserved in February 2025 and published in December 2025, with no patches currently linked, and no known exploits in the wild. The affected product, Infinera MTC-9, is a telecommunications platform used in optical transport networks, making this vulnerability particularly critical for telecom operators. Exploitation could allow attackers to access internal services, potentially leading to data leakage or further network compromise. The lack of authentication and user interaction requirements significantly lowers the barrier for exploitation. The scope change means the vulnerability affects resources beyond the initially vulnerable component, increasing risk.
Potential Impact
For European organizations, especially telecom operators and network service providers using Infinera MTC-9 systems, this SSRF vulnerability poses a significant risk. Exploitation could allow attackers to access internal network resources that are otherwise protected, potentially exposing sensitive data or enabling lateral movement within critical infrastructure. Confidentiality breaches could impact customer data, network configurations, or proprietary information. Given the role of Infinera MTC-9 in optical transport networks, disruption or data leakage could affect service availability indirectly by enabling further attacks. The vulnerability’s ease of exploitation without authentication increases the likelihood of targeted attacks or opportunistic scanning. This could undermine trust in telecom providers and impact compliance with European data protection regulations such as GDPR. The potential for attackers to pivot from the SSRF to more damaging exploits elevates the threat to national critical infrastructure and commercial enterprises relying on these networks.
Mitigation Recommendations
1. Monitor Infinera’s official channels closely for security patches addressing CVE-2025-26487 and apply them immediately upon release. 2. Implement strict egress filtering on network devices to restrict outbound requests from the MTC-9 system to only trusted and necessary destinations, minimizing SSRF exploitation scope. 3. Use network segmentation to isolate management interfaces and internal services from the broader network, reducing accessible attack surface. 4. Employ Web Application Firewalls (WAFs) or intrusion detection/prevention systems (IDS/IPS) with SSRF detection capabilities to identify and block suspicious request patterns. 5. Conduct regular security assessments and penetration testing focused on SSRF and related vulnerabilities in telecom infrastructure. 6. Review and harden server-side request handling logic and input validation where possible, even if patches are not yet available. 7. Maintain comprehensive logging and monitoring to detect anomalous outbound requests originating from the MTC-9 system. 8. Coordinate with national cybersecurity agencies for threat intelligence sharing and incident response preparedness.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- ENISA
- Date Reserved
- 2025-02-11T08:24:51.661Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69369326ddfbd9e35f933089
Added to database: 12/8/2025, 8:58:14 AM
Last enriched: 12/8/2025, 9:13:20 AM
Last updated: 12/10/2025, 1:48:10 PM
Views: 57
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2024-2105: CWE-1287 Improper Validation of Specified Type of Input in JBL Flip 5
MediumCVE-2024-2104: CWE-306 Missing Authentication for Critical Function in JBL LIVE PRO 2 TWS
HighCVE-2025-13184: CWE-306 Missing Authentication for Critical Function in Toto Link X5000R's (AX1800 router)
UnknownMicrosoft Issues Security Fixes for 56 Flaws, Including Active Exploit and Two Zero-Days
HighCVE-2025-13953: CWE-290 Authentication Bypass by Spoofing in GTT Sistema de Información Tributario
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.