CVE-2025-10937
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-10-23

Last updated on: 2025-10-27

Assigner: ICS-CERT

Description
Oxford Nanopore Technologies' MinKNOW software at or prior to version 24.11 creates a temporary file to store the local authentication token during startup, before copying it to its final location. This temporary file is created in a directory accessible to all users on the system. An unauthorized local user or process can exploit this behavior by placing a file lock on the temporary token file using the flock system call. This prevents MinKNOW from completing the token generation process. As a result, no valid local token is created, and the software is unable to execute commands on the sequencer. This leads to a denial-of-service (DoS) condition, blocking sequencing operations.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-10-23
Last Modified
2025-10-27
Generated
2026-05-07
AI Q&A
2025-10-23
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
oxford_nanopore_technologies mindknow *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-754 The product does not check or incorrectly checks for unusual or exceptional conditions that are not expected to occur frequently during day to day operation of the product.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability occurs in Oxford Nanopore Technologies' MinKNOW software (version 24.11 or earlier), where a temporary file storing the local authentication token is created in a directory accessible to all users. An unauthorized local user or process can place a file lock on this temporary token file using the flock system call, preventing MinKNOW from completing the token generation. As a result, no valid local token is created, causing the software to be unable to execute commands on the sequencer and leading to a denial-of-service (DoS) condition that blocks sequencing operations.


How can this vulnerability impact me? :

The impact of this vulnerability is a denial-of-service (DoS) condition on the MinKNOW software, which prevents it from executing commands on the sequencer. This means sequencing operations can be blocked, potentially disrupting workflows that depend on the sequencer's functionality.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart