We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-27021

Operating System Misconfiguration in Infinera G42



Description

The misconfiguration in the sudoers configuration of the operating system in Infinera G42 version R6.1.3 allows low privileged OS users to read/write physical memory via devmem command line tool. This could allow sensitive information disclosure, denial of service, and privilege escalation by tampering with kernel memory. Details: The output of "sudo -l" reports the presence of "devmem" command executable as super user without using a password. This command allows to read and write an arbitrary memory area of the target device, specifying an absolute address.

Reserved 2025-02-18 | Published 2025-07-02 | Updated 2025-07-02 | Assigner ENISA


HIGH: 7.0CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

Product status

Default status
unaffected

6.1.3 before 7.1
affected

Credits

Agenzia per la Cybersicurezza Nazionale finder

References

www.cvcn.gov.it/cvcn/cve/CVE-2025-27021 government-resource

euvd.enisa.europa.eu/vulnerability/CVE-2025-27021 vdb-entry

cve.org (CVE-2025-27021)

nvd.nist.gov (CVE-2025-27021)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-27021

Support options

Helpdesk Chat, Email, Knowledgebase