CVE-2025-24330
BaseFortify
Publication date: 2025-07-02
Last updated on: 2025-07-03
Assigner: Nokia
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-22 | The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a path traversal issue in Nokia Single RAN baseband software versions earlier than release 24R1-SR 1.0 MP. It occurs when a crafted SOAP 'provision' operation message with a manipulated PlanId field is sent within the Mobile Network Operator's internal Radio Access Network management network. This crafted input can cause the software to access unintended file system paths.
How can this vulnerability impact me? :
The vulnerability can allow an attacker to perform path traversal, potentially accessing or modifying files outside the intended directories within the Nokia Single RAN baseband software environment. This could lead to unauthorized access to sensitive data or disruption of network management functions.
What immediate steps should I take to mitigate this vulnerability?
Upgrade the Nokia Single RAN baseband software to release 24R1-SR 1.0 MP or later, as these versions include input validation for the PlanId field in the OAM service software to mitigate the path traversal issue.