CVE-2025-24329 (GCVE-0-2025-24329)

Vulnerability from cvelistv5 – Published: 2025-07-02 08:27 – Updated: 2025-07-02 13:38
VLAI?
Summary
Sending a crafted SOAP "provision" operation message archive field within the Mobile Network Operator (MNO) internal Radio Access Network (RAN) management network can cause path traversal issue in Nokia Single RAN baseband software with versions earlier than release 24R1-SR 1.0 MP. This issue has been corrected to release 24R1-SR 1.0 MP and later. Beginning with release 24R1-SR 1.0 MP, the OAM service software utilizes libarchive APIs with security options enabled, effectively mitigating the reported path traversal issue.
CWE
  • CWE-22 - Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Assigner
Impacted products
Vendor Product Version
Nokia Nokia Single RAN Affected: All releases prior to 24R1-SR 1.0 MP
Unaffected: 24R1-SR 1.0 MP and later
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "HIGH",
              "attackVector": "ADJACENT_NETWORK",
              "availabilityImpact": "HIGH",
              "baseScore": 6.4,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "HIGH",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2025-24329",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-07-02T13:35:51.266536Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-22",
                "description": "CWE-22 Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-07-02T13:38:28.621Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Nokia Single RAN",
          "vendor": "Nokia",
          "versions": [
            {
              "status": "affected",
              "version": "All releases prior to 24R1-SR 1.0 MP"
            },
            {
              "status": "unaffected",
              "version": "24R1-SR 1.0 MP and later"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Sending a crafted SOAP \"provision\" operation message archive field within the Mobile Network Operator (MNO) internal Radio Access Network (RAN) management network can cause path traversal issue in Nokia Single RAN baseband software with versions earlier than release 24R1-SR 1.0 MP. This issue has been corrected to release 24R1-SR 1.0 MP and later.\n\nBeginning with release 24R1-SR 1.0 MP, the OAM service software utilizes libarchive APIs with security options enabled, effectively mitigating the reported path traversal issue."
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-07-02T08:27:43.287Z",
        "orgId": "b48c3b8f-639e-4c16-8725-497bc411dad0",
        "shortName": "Nokia"
      },
      "references": [
        {
          "name": "Nokia Security Advisory",
          "url": "https://www.nokia.com/about-us/security-and-privacy/product-security-advisory/cve-2025-24329/"
        }
      ],
      "title": "OAM service path traversal issue caused by a crafted SOAP message archive field within the RAN management network",
      "x_generator": {
        "engine": "cveClient/1.0.15"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b48c3b8f-639e-4c16-8725-497bc411dad0",
    "assignerShortName": "Nokia",
    "cveId": "CVE-2025-24329",
    "datePublished": "2025-07-02T08:27:43.287Z",
    "dateReserved": "2025-01-20T05:33:25.523Z",
    "dateUpdated": "2025-07-02T13:38:28.621Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2025-24329\",\"sourceIdentifier\":\"b48c3b8f-639e-4c16-8725-497bc411dad0\",\"published\":\"2025-07-02T09:15:24.390\",\"lastModified\":\"2025-07-03T15:13:53.147\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Sending a crafted SOAP \\\"provision\\\" operation message archive field within the Mobile Network Operator (MNO) internal Radio Access Network (RAN) management network can cause path traversal issue in Nokia Single RAN baseband software with versions earlier than release 24R1-SR 1.0 MP. This issue has been corrected to release 24R1-SR 1.0 MP and later.\\n\\nBeginning with release 24R1-SR 1.0 MP, the OAM service software utilizes libarchive APIs with security options enabled, effectively mitigating the reported path traversal issue.\"},{\"lang\":\"es\",\"value\":\"El env\u00edo de un campo de archivo de mensaje de operaci\u00f3n SOAP \\\"aprovisionamiento\\\" manipulado dentro de la red de gesti\u00f3n de la Red de Acceso Radio (RAN) interna del Operador de Red M\u00f3vil (MNO) puede causar un problema de path traversal en el software de banda base de Nokia Single RAN con versiones anteriores a la 24R1-SR 1.0 MP. Este problema se ha corregido en la versi\u00f3n 24R1-SR 1.0 MP y posteriores. A partir de la versi\u00f3n 24R1-SR 1.0 MP, el software del servicio OAM utiliza las API de libarchive con opciones de seguridad habilitadas, lo que mitiga eficazmente el problema de path traversal reportado.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":6.4,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"ADJACENT_NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":0.5,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-22\"}]}],\"references\":[{\"url\":\"https://www.nokia.com/about-us/security-and-privacy/product-security-advisory/cve-2025-24329/\",\"source\":\"b48c3b8f-639e-4c16-8725-497bc411dad0\"}]}}",
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 6.4, \"attackVector\": \"ADJACENT_NETWORK\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"HIGH\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"HIGH\", \"confidentialityImpact\": \"HIGH\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-24329\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-07-02T13:35:51.266536Z\"}}}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-22\", \"description\": \"CWE-22 Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-07-02T13:36:51.964Z\"}}], \"cna\": {\"title\": \"OAM service path traversal issue caused by a crafted SOAP message archive field within the RAN management network\", \"affected\": [{\"vendor\": \"Nokia\", \"product\": \"Nokia Single RAN\", \"versions\": [{\"status\": \"affected\", \"version\": \"All releases prior to 24R1-SR 1.0 MP\"}, {\"status\": \"unaffected\", \"version\": \"24R1-SR 1.0 MP and later\"}]}], \"references\": [{\"url\": \"https://www.nokia.com/about-us/security-and-privacy/product-security-advisory/cve-2025-24329/\", \"name\": \"Nokia Security Advisory\"}], \"x_generator\": {\"engine\": \"cveClient/1.0.15\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"Sending a crafted SOAP \\\"provision\\\" operation message archive field within the Mobile Network Operator (MNO) internal Radio Access Network (RAN) management network can cause path traversal issue in Nokia Single RAN baseband software with versions earlier than release 24R1-SR 1.0 MP. This issue has been corrected to release 24R1-SR 1.0 MP and later.\\n\\nBeginning with release 24R1-SR 1.0 MP, the OAM service software utilizes libarchive APIs with security options enabled, effectively mitigating the reported path traversal issue.\"}], \"providerMetadata\": {\"orgId\": \"b48c3b8f-639e-4c16-8725-497bc411dad0\", \"shortName\": \"Nokia\", \"dateUpdated\": \"2025-07-02T08:27:43.287Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2025-24329\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-07-02T13:38:28.621Z\", \"dateReserved\": \"2025-01-20T05:33:25.523Z\", \"assignerOrgId\": \"b48c3b8f-639e-4c16-8725-497bc411dad0\", \"datePublished\": \"2025-07-02T08:27:43.287Z\", \"assignerShortName\": \"Nokia\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…