CVE-2025-26487

8.6 HIGH

📋 TL;DR

An unauthenticated Server-Side Request Forgery (SSRF) vulnerability in Infinera MTC-9 allows attackers to make the appliance send HTTPS requests to internal network resources, potentially accessing sensitive systems. This affects Infinera MTC-9 appliances with vulnerable versions exposed to untrusted networks. Remote attackers can exploit this without credentials.

💻 Affected Systems

Products:
  • Infinera MTC-9
Versions: Specific vulnerable version not specified in CVE description
Operating Systems: Embedded/Appliance OS
Default Config Vulnerable: ⚠️ Yes
Notes: Appliance must have network connectivity to internal resources. Vulnerability exists in HTTPS request handling functionality.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers pivot through the appliance to access internal systems, steal credentials, execute commands on backend servers, or exfiltrate sensitive data from protected networks.

🟠

Likely Case

Attackers scan internal networks, access metadata services, interact with internal APIs, or retrieve information from systems behind the appliance.

🟢

If Mitigated

Limited to port scanning internal networks or accessing only non-sensitive services if proper network segmentation and access controls are implemented.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

SSRF vulnerabilities typically require minimal technical skill to exploit using tools like Burp Suite or curl. Attackers need network access to the appliance.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified

Vendor Advisory: https://www.cvcn.gov.it/cvcn/cve/CVE-2025-26487

Restart Required: No

Instructions:

1. Monitor Infinera security advisories for patch availability. 2. Apply vendor-provided firmware update when released. 3. Verify patch installation and test functionality.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict appliance network access to only required internal resources using firewall rules

Access Control Lists

all

Implement ACLs to limit which IP addresses can communicate with the appliance

🧯 If You Can't Patch

  • Isolate appliance in dedicated network segment with strict egress filtering
  • Implement web application firewall (WAF) with SSRF protection rules

🔍 How to Verify

Check if Vulnerable:

Test if appliance accepts and processes external URLs via HTTPS requests. Use SSRF testing tools to attempt requests to internal resources.

Check Version:

Check appliance web interface or CLI for firmware version information

Verify Fix Applied:

After applying vendor patch, retest SSRF attempts to confirm they are blocked or properly validated.

📡 Detection & Monitoring

Log Indicators:

  • Unusual outbound HTTPS requests from appliance
  • Requests to internal IP addresses or metadata services
  • Failed authentication attempts from appliance IP

Network Indicators:

  • Appliance making unexpected HTTPS connections to internal systems
  • Traffic patterns suggesting port scanning from appliance

SIEM Query:

source_ip="[appliance_ip]" AND (dest_port=443 OR protocol="HTTPS") AND dest_ip IN (private_ip_ranges)

🔗 References

📤 Share & Export