CVE-2024-25659
Unauthorized SFTP File Modifications in TNMS Installation Folders

Public disclosure

03-06-2025

Last updated

03-06-2025

Vulnerability type

CWE-22: Improper Limitation of a Pathname to a Restricted Directory (‘Path Traversal’)

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

CVSS score

7.2

Description

In Infinera TNMS (Transcend Network Management System), an insecure default configuration of the internal SFTP server allows a low-privileged SFTP user to perform unauthorized modifications to the TNMS installation folders.

This vulnerability could lead to unauthorized changes and potential disruption of the TNMS services. 

Affected products and versions

All versions before TNMS V21.10 release. 

Mitigation plan

By default, the internal SFTP user that is used to transfer files between the NE network and TNMS applications has permissions to access TNMS related folders. To mitigate this vulnerability, the TNMS SFTP user should be restricted to access only the application data folders, and additionally, forbidden to login into the system.

Please follow the chapter 7.5.2 Restricting the TNMS SFTP User chapter to restrict the TNMS SFTP user access (for version 21.00 consult the WU05 FSB). 

Acknowledgements

cvcn (CENTRO DI VALUTAZIONE E CERTIFICAZIONE NAZIONALE)

References

Change history : Initial version is published on 03-06-2025