Metrics
Affected Vendors & Products
No advisories yet.
Solution
Oxford Nanopore Technologies recommends users upgrade to MinKNOW Versions later than 24.11 https://nanoporetech.com/software/ to eliminate these vulnerabilities. If users are unable to upgrade to v24.11 to reduce risk from the remaining Authentication Token and Token Lock vulnerabilities, Oxford Nanopore advises the following additional measures for users on version 24.06: * Remote Connect: Keep Remote Connect disabled in MinKNOW unless strictly required, and enable it only within trusted network environments. * Endpoint Protection: Install and maintain antivirus and malware scanning tools to mitigate denial-of-service (DoS) conditions arising from local exploitation or malware. Users running older versions of MinKNOW who cannot upgrade immediately should contact Oxford Nanopore Support https://nanoporetech.com/about/contact for guidance on securing their configurations. Downloading the release requires users to be logged into the Nanopore Community.
Workaround
No workaround given by the vendor.
Fri, 24 Oct 2025 10:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Nanoporetech
Nanoporetech minknow |
|
| Vendors & Products |
Nanoporetech
Nanoporetech minknow |
Thu, 23 Oct 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 23 Oct 2025 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Oxford Nanopore Technologies' MinKNOW software at or prior to version 24.11 creates a temporary file to store the local authentication token during startup, before copying it to its final location. This temporary file is created in a directory accessible to all users on the system. An unauthorized local user or process can exploit this behavior by placing a file lock on the temporary token file using the flock system call. This prevents MinKNOW from completing the token generation process. As a result, no valid local token is created, and the software is unable to execute commands on the sequencer. This leads to a denial-of-service (DoS) condition, blocking sequencing operations. | |
| Title | Oxford Nanopore Technologies MinKNOW Improper Check for Unusual or Exceptional Conditions | |
| Weaknesses | CWE-754 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2025-10-23T19:11:36.103Z
Reserved: 2025-09-24T22:17:56.931Z
Link: CVE-2025-10937
Updated: 2025-10-23T19:11:32.325Z
Status : Received
Published: 2025-10-23T19:15:48.070
Modified: 2025-10-23T19:15:48.070
Link: CVE-2025-10937
No data.
OpenCVE Enrichment
Updated: 2025-10-24T10:16:47Z