Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

fstec логотип

BDU:2025-07974

Опубликовано: 02 июл. 2025
Источник: fstec
CVSS3: 6.4
CVSS2: 6
EPSS Низкий

Описание

Уязвимость службы OAM платформы управления сетями Nokia Single RAN (Single Radio Access Network) связана с неверным ограничением имени пути к каталогу с ошибками при управлении привилегиями. Эксплуатация уязвимости может позволить нарушителю повысить свои привилегии

Вендор

Nokia

Наименование ПО

Single RAN

Версия ПО

до 24R1-SR 1.0 MP (Single RAN)

Тип ПО

Прикладное ПО информационных систем

Операционные системы и аппаратные платформы

-

Уровень опасности уязвимости

Средний уровень опасности (базовая оценка CVSS 2.0 составляет 6)
Средний уровень опасности (базовая оценка CVSS 3.1 составляет 6,4)

Возможные меры по устранению уязвимости

Использование рекомендаций производителя:
https://www.nokia.com/about-us/security-and-privacy/product-security-advisory/cve-2025-24331/

Статус уязвимости

Подтверждена производителем

Наличие эксплойта

Данные уточняются

Информация об устранении

Уязвимость устранена

Идентификаторы других систем описаний уязвимостей

EPSS

Процентиль: 2%
0.00015
Низкий

6.4 Medium

CVSS3

6 Medium

CVSS2

Связанные уязвимости

CVSS3: 6.4
nvd
7 месяцев назад

The Single RAN baseband OAM service is intended to run as an unprivileged service. However, it initially starts with root privileges and assigns certain capabilities before dropping to an unprivileged level. The capabilities retained from the root period are considered extensive after the privilege drop and, in theory, could potentially allow actions beyond the intended scope of the OAM service. These actions could include gaining root privileges, accessing root-owned files, modifying them as the file owner, and then returning them to root ownership. This issue has been corrected starting from release 24R1-SR 0.2 MP and later. Beginning with release 24R1-SR 0.2 MP, the OAM service software capabilities are restricted to the minimum necessary.

CVSS3: 6.4
github
7 месяцев назад

The Single RAN baseband OAM service is intended to run as an unprivileged service. However, it initially starts with root privileges and assigns certain capabilities before dropping to an unprivileged level. The capabilities retained from the root period are considered extensive after the privilege drop and, in theory, could potentially allow actions beyond the intended scope of the OAM service. These actions could include gaining root privileges, accessing root-owned files, modifying them as the file owner, and then returning them to root ownership. This issue has been corrected starting from release 24R1-SR 0.2 MP and later. Beginning with release 24R1-SR 0.2 MP, the OAM service software capabilities are restricted to the minimum necessary.

EPSS

Процентиль: 2%
0.00015
Низкий

6.4 Medium

CVSS3

6 Medium

CVSS2