Skip to main content

CVE-2025-27024: CWE-280: Improper Handling of Insufficient Permissions or Privileges in Infinera G42

Medium
VulnerabilityCVE-2025-27024cvecve-2025-27024cwe-280
Published: Wed Jul 02 2025 (07/02/2025, 09:38:32 UTC)
Source: CVE Database V5
Vendor/Project: Infinera
Product: G42

Description

Unrestricted access to OS file system in SFTP service in Infinera G42 version R6.1.3 allows remote authenticated users to read/write OS files via SFTP connections. Details: Account members of the Network Administrator profile can access the target machine via SFTP with the same credentials used for SSH CLI access and are able to read all files according to the OS permission instead of remaining inside the chrooted directory position.

AI-Powered Analysis

AILast updated: 07/02/2025, 10:09:30 UTC

Technical Analysis

CVE-2025-27024 is a medium-severity vulnerability affecting the Infinera G42 optical transport platform, specifically version 6.1.3. The issue arises from improper handling of insufficient privileges (CWE-274) in the device's SFTP service. Network Administrator profile users, who authenticate remotely via SFTP using the same credentials as for SSH CLI access, are able to bypass intended directory restrictions. Instead of being confined to a chrooted directory, these users can access the underlying operating system's file system according to the OS-level permissions. This unrestricted file system access allows remote authenticated users to read and write arbitrary files on the device. The vulnerability does not require user interaction beyond authentication and has a CVSS 3.1 base score of 6.5, reflecting a medium severity with high confidentiality impact but no impact on integrity or availability. The attack vector is network-based with low attack complexity, requiring privileges equivalent to a Network Administrator account. No known exploits are currently reported in the wild. The root cause is the failure to properly enforce chroot jail restrictions on SFTP sessions, allowing privilege escalation within the scope of the authenticated user's OS permissions. This flaw could lead to unauthorized disclosure of sensitive configuration files or system data, potentially aiding further attacks or causing operational disruptions if critical files are modified.

Potential Impact

For European organizations using Infinera G42 devices, particularly in telecommunications and critical infrastructure sectors, this vulnerability poses a significant risk to confidentiality. Unauthorized access to OS files could expose sensitive network configurations, encryption keys, or operational data. Although the vulnerability does not directly impact system integrity or availability, the ability to read or write OS files could facilitate further exploitation or service disruption. Given the role of Infinera G42 in optical transport networks, exploitation could undermine network security and data privacy, affecting service providers and enterprises reliant on these networks. The requirement for Network Administrator credentials limits the attack surface but insider threats or credential compromise scenarios remain concerning. The vulnerability could also be leveraged in targeted attacks against European telecom operators, impacting national infrastructure resilience and data protection compliance under GDPR.

Mitigation Recommendations

Organizations should immediately verify if their Infinera G42 devices are running version 6.1.3 and restrict Network Administrator profile access to trusted personnel only. Network segmentation and strict access controls should be enforced to limit SFTP and SSH access to management networks. Monitoring and logging of SFTP sessions should be enhanced to detect anomalous file access patterns. Since no patch is currently available, consider deploying compensating controls such as disabling SFTP access for Network Administrator accounts if operationally feasible or using alternative secure management methods. Regularly audit user privileges and rotate credentials to reduce risk from compromised accounts. Engage with Infinera support to obtain updates on patch availability and apply security updates promptly once released. Additionally, implement file integrity monitoring on critical system files to detect unauthorized modifications.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
ENISA
Date Reserved
2025-02-18T06:59:55.889Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 686501d56f40f0eb7292445a

Added to database: 7/2/2025, 9:54:29 AM

Last enriched: 7/2/2025, 10:09:30 AM

Last updated: 7/2/2025, 1:24:32 PM

Views: 3

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats