CVE-2024-25660

9.0 CRITICAL

📋 TL;DR

CVE-2024-25660 allows low-privileged remote attackers to perform unauthorized file operations through the WebDAV service in Infinera TNMS due to excessive privileges. This affects organizations using Infinera Transcend Network Management System version 19.10.3 for optical network management.

💻 Affected Systems

Products:
  • Infinera Transcend Network Management System (TNMS)
Versions: 19.10.3
Operating Systems: Not specified in available references
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in the WebDAV service component with default configurations.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could modify critical system files, install backdoors, exfiltrate sensitive network configuration data, or disrupt network management operations.

🟠

Likely Case

Unauthorized file access leading to information disclosure, configuration tampering, or privilege escalation within the management system.

🟢

If Mitigated

Limited impact if proper network segmentation, access controls, and monitoring are implemented to restrict WebDAV service access.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires low-privileged credentials but leverages excessive WebDAV service privileges.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified in available references

Vendor Advisory: https://www.nokia.com/optical-networks/infinera/

Restart Required: No

Instructions:

1. Monitor vendor advisory for patch availability. 2. Apply vendor-provided patch when released. 3. Test in non-production environment first.

🔧 Temporary Workarounds

Disable WebDAV Service

all

Disable the vulnerable WebDAV service if not required for operations.

Specific commands depend on TNMS implementation - consult vendor documentation

Restrict Network Access

all

Implement firewall rules to restrict access to WebDAV service ports.

iptables -A INPUT -p tcp --dport [webdav_port] -j DROP
netsh advfirewall firewall add rule name="Block TNMS WebDAV" dir=in action=block protocol=TCP localport=[webdav_port]

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate TNMS systems from untrusted networks.
  • Enforce principle of least privilege for all TNMS user accounts and monitor for unusual file operations.

🔍 How to Verify

Check if Vulnerable:

Check TNMS version via administrative interface or system logs for version 19.10.3.

Check Version:

Specific command depends on TNMS implementation - consult vendor documentation

Verify Fix Applied:

Verify WebDAV service is disabled or patched version is installed after remediation.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file operations via WebDAV service
  • Multiple failed authentication attempts followed by successful WebDAV access
  • File modifications by low-privileged users

Network Indicators:

  • Unexpected connections to WebDAV service ports
  • Unusual file transfer patterns to/from TNMS system

SIEM Query:

source="tnms_logs" AND (event="webdav_file_operation" AND user_privilege="low")

🔗 References

📤 Share & Export