CVE-2025-27024

6.5 MEDIUM

📋 TL;DR

This vulnerability allows remote authenticated users with Network Administrator privileges in Infinera G42 version R6.1.3 to read and write arbitrary OS files via SFTP connections. The SFTP service fails to properly restrict users to chrooted directories, exposing the entire file system to authorized attackers.

💻 Affected Systems

Products:
  • Infinera G42
Versions: R6.1.3
Operating Systems: Not specified, likely embedded Linux-based OS
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects users with Network Administrator profile credentials. Requires SFTP service to be enabled and accessible.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise including theft of sensitive data, installation of persistent malware, credential harvesting, and disruption of network operations.

🟠

Likely Case

Unauthorized access to configuration files, logs, and sensitive system data leading to information disclosure and potential privilege escalation.

🟢

If Mitigated

Limited impact if proper network segmentation, least privilege access, and monitoring are in place to detect unusual SFTP activity.

🌐 Internet-Facing: HIGH if SFTP service is exposed to the internet, as authenticated attackers can access the entire file system.
🏢 Internal Only: MEDIUM to HIGH depending on internal network segmentation and access controls for Network Administrator accounts.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires valid Network Administrator credentials and SFTP access. The vulnerability is straightforward to exploit once authenticated.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified in available references

Vendor Advisory: Not provided in references

Restart Required: No

Instructions:

1. Contact Infinera support for patch availability and guidance. 2. Monitor vendor security advisories for updates. 3. Apply patch when available following vendor instructions.

🔧 Temporary Workarounds

Disable SFTP Service

linux

Temporarily disable SFTP service if not required for operations

# Check vendor documentation for SFTP disable procedure
# Typically involves service management commands

Restrict Network Access

linux

Implement firewall rules to restrict SFTP access to trusted IP addresses only

iptables -A INPUT -p tcp --dport 22 -s TRUSTED_IP -j ACCEPT
iptables -A INPUT -p tcp --dport 22 -j DROP

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Infinera G42 devices from untrusted networks
  • Enforce least privilege by reviewing and minimizing Network Administrator accounts, implementing multi-factor authentication, and monitoring SFTP access logs

🔍 How to Verify

Check if Vulnerable:

1. Verify system is Infinera G42 version R6.1.3. 2. Test with Network Administrator credentials via SFTP client to attempt access to files outside expected directories (e.g., /etc/passwd).

Check Version:

# Check vendor documentation for version command
# Typically: show version or similar CLI command

Verify Fix Applied:

After applying vendor patch or workarounds, retest SFTP access to confirm chroot restrictions are properly enforced.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SFTP access patterns
  • SFTP connections accessing system directories like /etc, /var, /root
  • Multiple failed SFTP authentication attempts followed by successful access

Network Indicators:

  • SFTP connections from unexpected IP addresses
  • High volume of SFTP data transfer
  • SFTP sessions accessing non-standard directories

SIEM Query:

source="sftp_logs" AND (path="*/etc/*" OR path="*/root/*" OR path="*/var/*") AND action="read" OR action="write"

🔗 References

📤 Share & Export