{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-27026","assignerOrgId":"a6d3dc9e-0591-4a13-bce7-0f5b31ff6158","state":"PUBLISHED","assignerShortName":"ENISA","dateReserved":"2025-02-18T06:59:55.889Z","datePublished":"2025-07-02T13:42:42.068Z","dateUpdated":"2025-07-02T20:22:57.416Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"G42","vendor":"Infinera","versions":[{"lessThan":"8.0","status":"affected","version":"6.1.3","versionType":"semver"}]}],"credits":[{"lang":"en","type":"finder","value":"Agenzia per la Cybersicurezza Nazionale"}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"A missing double-check feature in the WebGUI for CLI deactivation in Infinera G42 \nversion R6.1.3 allows an authenticated administrator to make other \nmanagement interfaces unavailable via local and network interfaces. The CLI deactivation via the WebGUI does not only stop CLI interface but deactivates also Linux Shell, WebGUI and Physical Serial Console access. No \nconfirmation is asked at deactivation time. Loosing access to these services device administrators are at risk of completely loosing device control.<br>"}],"value":"A missing double-check feature in the WebGUI for CLI deactivation in Infinera G42 \nversion R6.1.3 allows an authenticated administrator to make other \nmanagement interfaces unavailable via local and network interfaces. The CLI deactivation via the WebGUI does not only stop CLI interface but deactivates also Linux Shell, WebGUI and Physical Serial Console access. No \nconfirmation is asked at deactivation time. Loosing access to these services device administrators are at risk of completely loosing device control."}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":4.9,"baseSeverity":"MEDIUM","confidentialityImpact":"NONE","integrityImpact":"NONE","privilegesRequired":"HIGH","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-1220","description":"CWE-1220: Insufficient Granularity of Access Control","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"a6d3dc9e-0591-4a13-bce7-0f5b31ff6158","shortName":"ENISA","dateUpdated":"2025-07-02T13:42:42.068Z"},"references":[{"tags":["government-resource"],"url":"https://www.cvcn.gov.it/cvcn/cve/CVE-2025-27026"},{"tags":["vdb-entry"],"url":"https://euvd.enisa.europa.eu/vulnerability/CVE-2025-27026"}],"source":{"discovery":"UNKNOWN"},"title":"Improper Access Control Granularity impacting Infinera G42","x_generator":{"engine":"Vulnogram 0.2.0"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-07-02T20:22:47.748223Z","id":"CVE-2025-27026","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-07-02T20:22:57.416Z"}}]}}