{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-27021","assignerOrgId":"a6d3dc9e-0591-4a13-bce7-0f5b31ff6158","state":"PUBLISHED","assignerShortName":"ENISA","dateReserved":"2025-02-18T06:59:55.888Z","datePublished":"2025-07-02T08:45:05.475Z","dateUpdated":"2025-07-02T14:32:53.922Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"G42","vendor":"Infinera","versions":[{"lessThan":"7.1","status":"affected","version":"6.1.3","versionType":"semver"}]}],"credits":[{"lang":"en","type":"finder","value":"Agenzia per la Cybersicurezza Nazionale"}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"The misconfiguration in the sudoers configuration of the operating system in\n Infinera G42 version R6.1.3 allows low privileged OS users to \nread/write physical memory via devmem command line tool. \nThis could \nallow sensitive information disclosure, denial of service, and privilege \nescalation by tampering with kernel memory.<br><br>\nDetails: The output of \"sudo -l\" reports the presence of \"devmem\" command \nexecutable as super user without using a password. This command allows \nto read and write an arbitrary memory area of the target device, \nspecifying an absolute address.  \n\n\n<br>"}],"value":"The misconfiguration in the sudoers configuration of the operating system in\n Infinera G42 version R6.1.3 allows low privileged OS users to \nread/write physical memory via devmem command line tool. \nThis could \nallow sensitive information disclosure, denial of service, and privilege \nescalation by tampering with kernel memory.\n\n\nDetails: The output of \"sudo -l\" reports the presence of \"devmem\" command \nexecutable as super user without using a password. This command allows \nto read and write an arbitrary memory area of the target device, \nspecifying an absolute address."}],"metrics":[{"cvssV3_1":{"attackComplexity":"HIGH","attackVector":"LOCAL","availabilityImpact":"HIGH","baseScore":7,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"providerMetadata":{"orgId":"a6d3dc9e-0591-4a13-bce7-0f5b31ff6158","shortName":"ENISA","dateUpdated":"2025-07-02T09:09:34.769Z"},"references":[{"tags":["government-resource"],"url":"https://www.cvcn.gov.it/cvcn/cve/CVE-2025-27021"},{"tags":["vdb-entry"],"url":"https://euvd.enisa.europa.eu/vulnerability/CVE-2025-27021"}],"source":{"discovery":"UNKNOWN"},"title":"Operating System Misconfiguration in Infinera G42","x_generator":{"engine":"Vulnogram 0.2.0"}},"adp":[{"problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-266","lang":"en","description":"CWE-266 Incorrect Privilege Assignment"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-07-02T14:31:46.993727Z","id":"CVE-2025-27021","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-07-02T14:32:53.922Z"}}]}}