CVE-2025-27024: CWE-280: Improper Handling of Insufficient Permissions or Privileges in Infinera G42
Unrestricted access to OS file system in SFTP service in Infinera G42 version R6.1.3 allows remote authenticated users to read/write OS files via SFTP connections. Details: Account members of the Network Administrator profile can access the target machine via SFTP with the same credentials used for SSH CLI access and are able to read all files according to the OS permission instead of remaining inside the chrooted directory position.
AI Analysis
Technical Summary
CVE-2025-27024 is a medium-severity vulnerability affecting the Infinera G42 optical transport platform, specifically version 6.1.3. The issue arises from improper handling of insufficient privileges (CWE-274) in the device's SFTP service. Network Administrator profile users, who authenticate remotely via SFTP using the same credentials as for SSH CLI access, are able to bypass intended directory restrictions. Instead of being confined to a chrooted directory, these users can access the underlying operating system's file system according to the OS-level permissions. This unrestricted file system access allows remote authenticated users to read and write arbitrary files on the device. The vulnerability does not require user interaction beyond authentication and has a CVSS 3.1 base score of 6.5, reflecting a medium severity with high confidentiality impact but no impact on integrity or availability. The attack vector is network-based with low attack complexity, requiring privileges equivalent to a Network Administrator account. No known exploits are currently reported in the wild. The root cause is the failure to properly enforce chroot jail restrictions on SFTP sessions, allowing privilege escalation within the scope of the authenticated user's OS permissions. This flaw could lead to unauthorized disclosure of sensitive configuration files or system data, potentially aiding further attacks or causing operational disruptions if critical files are modified.
Potential Impact
For European organizations using Infinera G42 devices, particularly in telecommunications and critical infrastructure sectors, this vulnerability poses a significant risk to confidentiality. Unauthorized access to OS files could expose sensitive network configurations, encryption keys, or operational data. Although the vulnerability does not directly impact system integrity or availability, the ability to read or write OS files could facilitate further exploitation or service disruption. Given the role of Infinera G42 in optical transport networks, exploitation could undermine network security and data privacy, affecting service providers and enterprises reliant on these networks. The requirement for Network Administrator credentials limits the attack surface but insider threats or credential compromise scenarios remain concerning. The vulnerability could also be leveraged in targeted attacks against European telecom operators, impacting national infrastructure resilience and data protection compliance under GDPR.
Mitigation Recommendations
Organizations should immediately verify if their Infinera G42 devices are running version 6.1.3 and restrict Network Administrator profile access to trusted personnel only. Network segmentation and strict access controls should be enforced to limit SFTP and SSH access to management networks. Monitoring and logging of SFTP sessions should be enhanced to detect anomalous file access patterns. Since no patch is currently available, consider deploying compensating controls such as disabling SFTP access for Network Administrator accounts if operationally feasible or using alternative secure management methods. Regularly audit user privileges and rotate credentials to reduce risk from compromised accounts. Engage with Infinera support to obtain updates on patch availability and apply security updates promptly once released. Additionally, implement file integrity monitoring on critical system files to detect unauthorized modifications.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden, Poland, Belgium, Finland
CVE-2025-27024: CWE-280: Improper Handling of Insufficient Permissions or Privileges in Infinera G42
Description
Unrestricted access to OS file system in SFTP service in Infinera G42 version R6.1.3 allows remote authenticated users to read/write OS files via SFTP connections. Details: Account members of the Network Administrator profile can access the target machine via SFTP with the same credentials used for SSH CLI access and are able to read all files according to the OS permission instead of remaining inside the chrooted directory position.
AI-Powered Analysis
Technical Analysis
CVE-2025-27024 is a medium-severity vulnerability affecting the Infinera G42 optical transport platform, specifically version 6.1.3. The issue arises from improper handling of insufficient privileges (CWE-274) in the device's SFTP service. Network Administrator profile users, who authenticate remotely via SFTP using the same credentials as for SSH CLI access, are able to bypass intended directory restrictions. Instead of being confined to a chrooted directory, these users can access the underlying operating system's file system according to the OS-level permissions. This unrestricted file system access allows remote authenticated users to read and write arbitrary files on the device. The vulnerability does not require user interaction beyond authentication and has a CVSS 3.1 base score of 6.5, reflecting a medium severity with high confidentiality impact but no impact on integrity or availability. The attack vector is network-based with low attack complexity, requiring privileges equivalent to a Network Administrator account. No known exploits are currently reported in the wild. The root cause is the failure to properly enforce chroot jail restrictions on SFTP sessions, allowing privilege escalation within the scope of the authenticated user's OS permissions. This flaw could lead to unauthorized disclosure of sensitive configuration files or system data, potentially aiding further attacks or causing operational disruptions if critical files are modified.
Potential Impact
For European organizations using Infinera G42 devices, particularly in telecommunications and critical infrastructure sectors, this vulnerability poses a significant risk to confidentiality. Unauthorized access to OS files could expose sensitive network configurations, encryption keys, or operational data. Although the vulnerability does not directly impact system integrity or availability, the ability to read or write OS files could facilitate further exploitation or service disruption. Given the role of Infinera G42 in optical transport networks, exploitation could undermine network security and data privacy, affecting service providers and enterprises reliant on these networks. The requirement for Network Administrator credentials limits the attack surface but insider threats or credential compromise scenarios remain concerning. The vulnerability could also be leveraged in targeted attacks against European telecom operators, impacting national infrastructure resilience and data protection compliance under GDPR.
Mitigation Recommendations
Organizations should immediately verify if their Infinera G42 devices are running version 6.1.3 and restrict Network Administrator profile access to trusted personnel only. Network segmentation and strict access controls should be enforced to limit SFTP and SSH access to management networks. Monitoring and logging of SFTP sessions should be enhanced to detect anomalous file access patterns. Since no patch is currently available, consider deploying compensating controls such as disabling SFTP access for Network Administrator accounts if operationally feasible or using alternative secure management methods. Regularly audit user privileges and rotate credentials to reduce risk from compromised accounts. Engage with Infinera support to obtain updates on patch availability and apply security updates promptly once released. Additionally, implement file integrity monitoring on critical system files to detect unauthorized modifications.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- ENISA
- Date Reserved
- 2025-02-18T06:59:55.889Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 686501d56f40f0eb7292445a
Added to database: 7/2/2025, 9:54:29 AM
Last enriched: 7/2/2025, 10:09:30 AM
Last updated: 7/2/2025, 1:24:32 PM
Views: 3
Related Threats
CVE-2025-45813: n/a
CriticalCVE-2025-45814: n/a
CriticalCVE-2025-20309: Use of Hard-coded Credentials in Cisco Cisco Unified Communications Manager Session Management Edition Engineering Special
CriticalCVE-2025-45424: n/a
MediumCVE-2025-20310: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Cisco Cisco Enterprise Chat and Email
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.