CVE-2025-11192

8.6 HIGH

📋 TL;DR

This vulnerability in Extreme Networks Fabric Engine (VOSS) allows attackers to gain unauthorized access to network fabric and configuration data when SD-WAN AutoSense is enabled. It affects VOSS versions before 9.3 by exploiting improper authentication validation in ISIS protocol settings. Network administrators using affected VOSS configurations are at risk.

💻 Affected Systems

Products:
  • Extreme Networks Fabric Engine (VOSS)
Versions: All versions before 9.3
Operating Systems: VOSS-specific OS
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when SD-WAN AutoSense is enabled on a port

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete network fabric compromise allowing data exfiltration, configuration manipulation, and lateral movement across the entire network infrastructure.

🟠

Likely Case

Unauthorized access to sensitive network configuration data and potential disruption of SD-WAN operations.

🟢

If Mitigated

Limited impact with proper network segmentation and monitoring, though configuration data exposure remains possible.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires network access to vulnerable ports with SD-WAN AutoSense enabled

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 9.3 or later

Vendor Advisory: https://extreme-networks.my.site.com/ExtrArticleDetail?an=000130291

Restart Required: Yes

Instructions:

1. Download VOSS version 9.3 or later from Extreme Networks support portal. 2. Backup current configuration. 3. Apply the update following Extreme Networks upgrade procedures. 4. Restart affected devices. 5. Verify SD-WAN AutoSense functionality post-upgrade.

🔧 Temporary Workarounds

Disable SD-WAN AutoSense

all

Temporarily disable SD-WAN AutoSense on all ports until patching can be completed

configure terminal
interface <interface-name>
no sd-wan autosense enable

Implement Network Segmentation

all

Isolate vulnerable ports using VLANs or firewall rules to limit attack surface

🧯 If You Can't Patch

  • Implement strict network access controls to limit traffic to vulnerable ports
  • Enable enhanced logging and monitoring for unauthorized access attempts to SD-WAN AutoSense interfaces

🔍 How to Verify

Check if Vulnerable:

Check VOSS version with 'show version' and verify if SD-WAN AutoSense is enabled on any ports with 'show running-config | include sd-wan autosense'

Check Version:

show version

Verify Fix Applied:

Verify version is 9.3 or later with 'show version' and confirm SD-WAN AutoSense functionality is working properly

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized ISIS authentication attempts
  • Unexpected SD-WAN AutoSense configuration changes
  • Access to fabric configuration from unauthorized sources

Network Indicators:

  • Unusual ISIS protocol traffic to SD-WAN AutoSense enabled ports
  • Unexpected configuration data transfers from fabric devices

SIEM Query:

source="voss_logs" AND (event_type="authentication_failure" OR event_type="configuration_change") AND (process="ISIS" OR process="SD-WAN")

🔗 References

📤 Share & Export