Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-27019: CWE-306 Missing Authentication for Critical Function in Infinera MTC-9

0
Critical
VulnerabilityCVE-2025-27019cvecve-2025-27019cwe-306
Published: Mon Dec 08 2025 (12/08/2025, 09:22:19 UTC)
Source: CVE Database V5
Vendor/Project: Infinera
Product: MTC-9

Description

Remote shell service (RSH) in Infinera MTC-9 version R22.1.1.0275 allows an attacker to utilize password-less user accounts and obtain system access by activating a reverse shell.This issue affects MTC-9: from R22.1.1.0275 before R23.0.

AI-Powered Analysis

AILast updated: 12/08/2025, 09:46:06 UTC

Technical Analysis

CVE-2025-27019 is a critical security vulnerability identified in the Infinera MTC-9 optical transport platform, specifically affecting versions from R22.1.1.0275 up to but not including R23.0. The vulnerability arises from a missing authentication control (CWE-306) in the remote shell service (RSH) component. This flaw allows an unauthenticated remote attacker to leverage password-less user accounts to activate a reverse shell, thereby gaining unauthorized system-level access. The lack of authentication means no credentials or user interaction are required, significantly lowering the barrier to exploitation. Once exploited, the attacker can execute arbitrary commands, potentially leading to full system compromise, data exfiltration, service disruption, or manipulation of network traffic. The CVSS v3.1 base score of 9.8 reflects the vulnerability’s critical severity, with attack vector being network-based, no privileges or user interaction needed, and high impact on confidentiality, integrity, and availability. The vulnerability affects critical network infrastructure equipment widely used in telecommunications networks to manage optical transport systems. Although no public exploits have been reported yet, the nature of the flaw and the criticality of the affected systems make it a high-risk issue. The vulnerability was reserved in February 2025 and published in December 2025, indicating a recent discovery and disclosure. Infinera has not yet published patches, so organizations must rely on interim mitigations and monitoring until updates are available.

Potential Impact

For European organizations, particularly those in telecommunications, internet service provision, and critical infrastructure sectors, this vulnerability poses a severe risk. Exploitation could allow attackers to gain full control over Infinera MTC-9 devices, which are integral to optical transport networks that underpin large-scale data transmission across countries. This could lead to interception or manipulation of sensitive communications, disruption of network services, and cascading failures affecting dependent systems. The compromise of such infrastructure could also facilitate espionage, sabotage, or large-scale denial of service attacks. Given the strategic importance of telecommunications in Europe’s digital economy and security, the impact extends beyond individual organizations to national security and economic stability. The vulnerability’s ease of exploitation and lack of authentication requirements increase the likelihood of targeted attacks or opportunistic exploitation by cybercriminals or state-sponsored actors. The absence of known exploits currently provides a window for proactive defense, but the criticality demands immediate action to prevent future incidents.

Mitigation Recommendations

1. Immediate deployment of vendor patches or updates once released by Infinera to address the authentication flaw in the RSH service. 2. Until patches are available, disable the remote shell service (RSH) on MTC-9 devices if it is not essential for operations. 3. Implement strict network segmentation and access controls to limit exposure of MTC-9 devices to trusted management networks only. 4. Deploy intrusion detection and prevention systems (IDS/IPS) with signatures or heuristics to detect reverse shell activity or anomalous command execution patterns. 5. Conduct regular audits and monitoring of device logs for unauthorized access attempts or unusual behavior indicative of exploitation. 6. Enforce multi-factor authentication and robust credential management on all network management interfaces to reduce risk from other attack vectors. 7. Coordinate with telecom infrastructure providers and national cybersecurity agencies for threat intelligence sharing and coordinated response. 8. Prepare incident response plans specifically addressing potential compromise of optical transport equipment to minimize downtime and data loss.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
ENISA
Date Reserved
2025-02-18T06:59:55.888Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69369ac1b488c525a1d4258a

Added to database: 12/8/2025, 9:30:41 AM

Last enriched: 12/8/2025, 9:46:06 AM

Last updated: 12/11/2025, 6:49:33 AM

Views: 64

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats