Description
Nokia MantaRay NM is vulnerable to a Relative Path Traversal vulnerability due to improper validation of input parameter on the file system in Software Manager application.
Published: 2026-04-07
Score: 5.7 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Information disclosure via relative path traversal
Action: Patch
AI Analysis

Impact

The vulnerability originates from the Software Manager application’s failure to properly validate input parameters that reference file system paths. An attacker who can influence these inputs may construct a request containing relative path components such as "..\" or "../../" to read files outside the intended directory. This enables the disclosure of sensitive files, potentially exposing configuration data, logs, or other confidential information. The weakness does not grant arbitrary code execution or privilege escalation, but it can compromise confidentiality within the affected device. The weakness corresponds to the CWE-23 classification of relative path traversal.

Affected Systems

All builds of Nokia MantaRay NM are vulnerable as the defect resides in the core Software Manager component. Without an applied vendor patch, any instance of the device that exposes the Software Manager interface to users or remote agents remains at risk. Specific version identifiers are not supplied, so all deployed firmware versions should be considered affected until a vendor update is released.

Risk and Exploitability

The CVSS base score of 5.7 indicates moderate impact, reflecting the limited nature of the disclosure. Because EPSS data is unavailable, the assessed likelihood of exploitation remains uncertain, but path traversal flaws are frequently targeted in practice. The vulnerability is not listed in CISA’s KEV catalog, suggesting no widely known, actively exploited examples at the time of reporting. The probable attack vector is remote, through interactions with the Software Manager interface, which may be accessed over local or network connections depending on configuration. An attacker would need the ability to send crafted input to the application; no additional privileges or user interaction are required beyond that.

Generated by OpenCVE AI on April 7, 2026 at 21:26 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Enterprise: Obtain and apply the latest Nokia MantaRay NM firmware that addresses CVE-2025-24819.
  • If a patch is unavailable, restrict external access to the Software Manager interface by firewall rules or network segmentation.
  • Configure the file system permissions for the Software Manager directory to the minimum required, preventing it from reading sensitive locations.
  • Enable logging and monitor for anomalous file access patterns, such as repeated ".." sequences, to detect attempted exploitation.
  • Consider employing a web application firewall or intrusion detection system to block or rate-limit path traversal patterns.

Generated by OpenCVE AI on April 7, 2026 at 21:26 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 08 Apr 2026 20:15:00 +0000

Type Values Removed Values Added
First Time appeared Nokia
Nokia mantaray Nm
Vendors & Products Nokia
Nokia mantaray Nm

Tue, 07 Apr 2026 20:45:00 +0000

Type Values Removed Values Added
Weaknesses CWE-23
Metrics cvssV3_1

{'score': 5.7, 'vector': 'CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 07 Apr 2026 18:00:00 +0000

Type Values Removed Values Added
Description Nokia MantaRay NM is vulnerable to a Relative Path Traversal vulnerability due to improper validation of input parameter on the file system in Software Manager application.
Title A Relative Path Traversal vulnerability in Nokia MantaRay NM
References

Subscriptions

Nokia Mantaray Nm
cve-icon MITRE

Status: PUBLISHED

Assigner: Nokia

Published:

Updated: 2026-04-07T17:56:15.517Z

Reserved: 2025-01-24T13:25:43.870Z

Link: CVE-2025-24819

cve-icon Vulnrichment

Updated: 2026-04-07T17:42:50.736Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-07T16:16:22.917

Modified: 2026-04-08T21:27:00.663

Link: CVE-2025-24819

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-08T19:48:26Z

Weaknesses