CVE-2025-27019: CWE-306 Missing Authentication for Critical Function in Infinera MTC-9
Remote shell service (RSH) in Infinera MTC-9 version R22.1.1.0275 allows an attacker to utilize password-less user accounts and obtain system access by activating a reverse shell.This issue affects MTC-9: from R22.1.1.0275 before R23.0.
AI Analysis
Technical Summary
CVE-2025-27019 is a critical security vulnerability identified in the Infinera MTC-9 optical transport platform, specifically affecting versions from R22.1.1.0275 up to but not including R23.0. The vulnerability arises from a missing authentication control (CWE-306) in the remote shell service (RSH) component. This flaw allows an unauthenticated remote attacker to leverage password-less user accounts to activate a reverse shell, thereby gaining unauthorized system-level access. The lack of authentication means no credentials or user interaction are required, significantly lowering the barrier to exploitation. Once exploited, the attacker can execute arbitrary commands, potentially leading to full system compromise, data exfiltration, service disruption, or manipulation of network traffic. The CVSS v3.1 base score of 9.8 reflects the vulnerability’s critical severity, with attack vector being network-based, no privileges or user interaction needed, and high impact on confidentiality, integrity, and availability. The vulnerability affects critical network infrastructure equipment widely used in telecommunications networks to manage optical transport systems. Although no public exploits have been reported yet, the nature of the flaw and the criticality of the affected systems make it a high-risk issue. The vulnerability was reserved in February 2025 and published in December 2025, indicating a recent discovery and disclosure. Infinera has not yet published patches, so organizations must rely on interim mitigations and monitoring until updates are available.
Potential Impact
For European organizations, particularly those in telecommunications, internet service provision, and critical infrastructure sectors, this vulnerability poses a severe risk. Exploitation could allow attackers to gain full control over Infinera MTC-9 devices, which are integral to optical transport networks that underpin large-scale data transmission across countries. This could lead to interception or manipulation of sensitive communications, disruption of network services, and cascading failures affecting dependent systems. The compromise of such infrastructure could also facilitate espionage, sabotage, or large-scale denial of service attacks. Given the strategic importance of telecommunications in Europe’s digital economy and security, the impact extends beyond individual organizations to national security and economic stability. The vulnerability’s ease of exploitation and lack of authentication requirements increase the likelihood of targeted attacks or opportunistic exploitation by cybercriminals or state-sponsored actors. The absence of known exploits currently provides a window for proactive defense, but the criticality demands immediate action to prevent future incidents.
Mitigation Recommendations
1. Immediate deployment of vendor patches or updates once released by Infinera to address the authentication flaw in the RSH service. 2. Until patches are available, disable the remote shell service (RSH) on MTC-9 devices if it is not essential for operations. 3. Implement strict network segmentation and access controls to limit exposure of MTC-9 devices to trusted management networks only. 4. Deploy intrusion detection and prevention systems (IDS/IPS) with signatures or heuristics to detect reverse shell activity or anomalous command execution patterns. 5. Conduct regular audits and monitoring of device logs for unauthorized access attempts or unusual behavior indicative of exploitation. 6. Enforce multi-factor authentication and robust credential management on all network management interfaces to reduce risk from other attack vectors. 7. Coordinate with telecom infrastructure providers and national cybersecurity agencies for threat intelligence sharing and coordinated response. 8. Prepare incident response plans specifically addressing potential compromise of optical transport equipment to minimize downtime and data loss.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden
CVE-2025-27019: CWE-306 Missing Authentication for Critical Function in Infinera MTC-9
Description
Remote shell service (RSH) in Infinera MTC-9 version R22.1.1.0275 allows an attacker to utilize password-less user accounts and obtain system access by activating a reverse shell.This issue affects MTC-9: from R22.1.1.0275 before R23.0.
AI-Powered Analysis
Technical Analysis
CVE-2025-27019 is a critical security vulnerability identified in the Infinera MTC-9 optical transport platform, specifically affecting versions from R22.1.1.0275 up to but not including R23.0. The vulnerability arises from a missing authentication control (CWE-306) in the remote shell service (RSH) component. This flaw allows an unauthenticated remote attacker to leverage password-less user accounts to activate a reverse shell, thereby gaining unauthorized system-level access. The lack of authentication means no credentials or user interaction are required, significantly lowering the barrier to exploitation. Once exploited, the attacker can execute arbitrary commands, potentially leading to full system compromise, data exfiltration, service disruption, or manipulation of network traffic. The CVSS v3.1 base score of 9.8 reflects the vulnerability’s critical severity, with attack vector being network-based, no privileges or user interaction needed, and high impact on confidentiality, integrity, and availability. The vulnerability affects critical network infrastructure equipment widely used in telecommunications networks to manage optical transport systems. Although no public exploits have been reported yet, the nature of the flaw and the criticality of the affected systems make it a high-risk issue. The vulnerability was reserved in February 2025 and published in December 2025, indicating a recent discovery and disclosure. Infinera has not yet published patches, so organizations must rely on interim mitigations and monitoring until updates are available.
Potential Impact
For European organizations, particularly those in telecommunications, internet service provision, and critical infrastructure sectors, this vulnerability poses a severe risk. Exploitation could allow attackers to gain full control over Infinera MTC-9 devices, which are integral to optical transport networks that underpin large-scale data transmission across countries. This could lead to interception or manipulation of sensitive communications, disruption of network services, and cascading failures affecting dependent systems. The compromise of such infrastructure could also facilitate espionage, sabotage, or large-scale denial of service attacks. Given the strategic importance of telecommunications in Europe’s digital economy and security, the impact extends beyond individual organizations to national security and economic stability. The vulnerability’s ease of exploitation and lack of authentication requirements increase the likelihood of targeted attacks or opportunistic exploitation by cybercriminals or state-sponsored actors. The absence of known exploits currently provides a window for proactive defense, but the criticality demands immediate action to prevent future incidents.
Mitigation Recommendations
1. Immediate deployment of vendor patches or updates once released by Infinera to address the authentication flaw in the RSH service. 2. Until patches are available, disable the remote shell service (RSH) on MTC-9 devices if it is not essential for operations. 3. Implement strict network segmentation and access controls to limit exposure of MTC-9 devices to trusted management networks only. 4. Deploy intrusion detection and prevention systems (IDS/IPS) with signatures or heuristics to detect reverse shell activity or anomalous command execution patterns. 5. Conduct regular audits and monitoring of device logs for unauthorized access attempts or unusual behavior indicative of exploitation. 6. Enforce multi-factor authentication and robust credential management on all network management interfaces to reduce risk from other attack vectors. 7. Coordinate with telecom infrastructure providers and national cybersecurity agencies for threat intelligence sharing and coordinated response. 8. Prepare incident response plans specifically addressing potential compromise of optical transport equipment to minimize downtime and data loss.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- ENISA
- Date Reserved
- 2025-02-18T06:59:55.888Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69369ac1b488c525a1d4258a
Added to database: 12/8/2025, 9:30:41 AM
Last enriched: 12/8/2025, 9:46:06 AM
Last updated: 12/11/2025, 6:49:33 AM
Views: 64
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.