CVE-2025-24819 Overview
Nokia MantaRay NM is vulnerable to a Relative Path Traversal vulnerability due to improper validation of input parameters on the file system in the Software Manager application. This vulnerability, classified under CWE-23 (Relative Path Traversal), allows authenticated attackers on an adjacent network to potentially access sensitive files outside the intended directory structure.
Critical Impact
Authenticated attackers with access to the adjacent network can exploit improper input validation to traverse the file system and access confidential data, potentially compromising the integrity of the network management platform.
Affected Products
- Nokia MantaRay NM Software Manager Application
Discovery Timeline
- 2026-04-07 - CVE-2025-24819 published to NVD
- 2026-04-08 - Last updated in NVD database
Technical Details for CVE-2025-24819
Vulnerability Analysis
This vulnerability exists within the Software Manager application component of Nokia MantaRay NM, a network management platform. The flaw stems from inadequate input validation when processing file system paths, allowing attackers to use relative path traversal sequences (such as ../) to escape the intended directory context and access files elsewhere on the system.
The attack requires the adversary to be positioned on an adjacent network and possess valid credentials (low privileges). Once authenticated, the attacker can craft malicious requests containing path traversal sequences that the application fails to properly sanitize. This results in unauthorized read access to sensitive files that should be restricted.
The impact is focused on confidentiality, as successful exploitation enables attackers to read sensitive system files, configuration data, or other confidential information stored on the target system.
Root Cause
The root cause is improper input validation (CWE-23: Relative Path Traversal) in the Software Manager application. The application fails to properly sanitize user-supplied input before using it to construct file system paths. This allows sequences like ../ to traverse outside the intended directory boundaries.
Attack Vector
The attack vector requires adjacent network access, meaning the attacker must be on the same network segment or have local network access to the vulnerable Nokia MantaRay NM installation. The attacker must also have low-privilege authentication credentials to interact with the Software Manager application.
Once positioned, the attacker can submit crafted requests containing relative path traversal sequences targeting the vulnerable input parameter. The application processes these requests without adequate path sanitization, allowing file access outside the designated directory. This attack path does not require user interaction and has low complexity once the prerequisites are met.
Detection Methods for CVE-2025-24819
Indicators of Compromise
- Unusual file access patterns in Software Manager application logs showing path traversal sequences such as ../ or ..\\
- Authentication events followed by requests containing encoded or obfuscated directory traversal characters
- Access attempts to sensitive system files from the Software Manager process context
Detection Strategies
- Monitor application logs for requests containing path traversal patterns including ../, ..\\, %2e%2e%2f, and similar encoded variants
- Implement file integrity monitoring on sensitive directories to detect unauthorized read operations
- Deploy network intrusion detection rules to identify path traversal attempts in adjacent network traffic
Monitoring Recommendations
- Enable verbose logging for the Nokia MantaRay NM Software Manager application
- Configure SIEM alerts for file system access patterns consistent with path traversal exploitation
- Review authentication logs for unusual low-privilege account activity targeting the Software Manager component
How to Mitigate CVE-2025-24819
Immediate Actions Required
- Review the Nokia Security Advisory for CVE-2025-24819 for vendor-specific guidance and available patches
- Restrict network access to the Nokia MantaRay NM Software Manager application to only authorized administrators
- Audit and minimize the number of accounts with access to the Software Manager application
- Implement network segmentation to limit adjacent network exposure
Patch Information
Nokia has published a security advisory for this vulnerability. Administrators should consult the Nokia Security Advisory for CVE-2025-24819 for specific patch availability and installation instructions.
Workarounds
- Implement strict network access controls to limit which systems can communicate with the MantaRay NM Software Manager on the adjacent network
- Deploy a web application firewall (WAF) or reverse proxy configured to filter path traversal patterns in requests
- Enforce principle of least privilege by auditing and reducing the number of authenticated accounts with Software Manager access
- Consider isolating the MantaRay NM system on a dedicated management VLAN with enhanced monitoring
Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

