CVE-2025-24818
Published: 07 April 2026
Summary
CVE-2025-24818 is a high-severity Command Injection (CWE-77) vulnerability in Nokia Mantaray Nm. Its CVSS base score is 8.0 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 36.7th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly requires information input validation and neutralization of special elements in the Log Search application to prevent OS command injection.
Mandates identification, reporting, and correction of the specific OS command injection flaw via patching as detailed in the vendor advisory.
Enforces least privilege to limit the scope and impact of arbitrary commands executed by low-privilege adjacent attackers exploiting the vulnerability.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
OS command injection directly enables arbitrary command execution (T1059) via exploitation of a vulnerable network-accessible application (T1190).
NVD Description
Nokia MantaRay NM is vulnerable to an OS command injection vulnerability due to improper neutralization of special elements used in an OS command in Log Search application.
Deeper analysisAI
CVE-2025-24818 is an OS command injection vulnerability (CWE-77) affecting the Log Search application in Nokia MantaRay NM. The flaw arises from improper neutralization of special elements used in an OS command, allowing malicious input to execute arbitrary system commands. It was published on 2026-04-07 with a CVSS v3.1 base score of 8.0 (AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H), indicating high severity due to its potential for significant impact.
Attackers with adjacent network access (AV:A) and low privileges (PR:L) can exploit this vulnerability with low complexity (AC:L) and no user interaction (UI:N). Successful exploitation enables arbitrary OS command execution on the affected system, resulting in high confidentiality (C:H), integrity (I:H), and availability (A:H) impacts within the unchanged scope (S:U). This could allow privilege escalation, data exfiltration, or system compromise from a nearby network position.
Nokia has published a product security advisory at https://www.nokia.com/we-are-nokia/security/product-security-advisory/cve-2025-24818/, which security practitioners should consult for details on patches, workarounds, and mitigation guidance.
Details
- CWE(s)