First published: Thu Oct 17 2024(Updated: )
Nokia SR OS routers allow read-write access to the entire file system via SFTP or SCP for users configured with "access console." Consequently, a low privilege authenticated user with "access console" can read or replace the router configuration file as well as other files stored in the Compact Flash or SD card without using CLI commands. This type of attack can lead to a compromise or denial of service of the router after the system is rebooted.
Credit: b48c3b8f-639e-4c16-8725-497bc411dad0
Affected Software | Affected Version | How to fix |
---|---|---|
Nokia Service Router Operating System |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-6729 is considered a high-risk vulnerability due to its potential for unauthorized read-write access to critical system files.
To mitigate CVE-2023-6729, restrict user permissions and ensure that only trusted users have access to the console.
CVE-2023-6729 affects users of Nokia SR OS routers configured with the 'access console' permission.
CVE-2023-6729 allows low privilege authenticated users to read or modify the entire file system, including crucial configuration files.
As of now, the status of a patch for CVE-2023-6729 should be confirmed through Nokia's official security channels.