{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-20T19:33:05.300","vulnerabilities":[{"cve":{"id":"CVE-2025-26487","sourceIdentifier":"a6d3dc9e-0591-4a13-bce7-0f5b31ff6158","published":"2025-12-08T09:15:46.487","lastModified":"2025-12-22T18:56:07.003","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Server-Side Request Forgery (SSRF) vulnerability in Infinera MTC-9 version allows \nremote unauthenticated users to gain access to other network resources \nusing HTTPS requests through the appliance used as a bridge."}],"metrics":{"cvssMetricV31":[{"source":"a6d3dc9e-0591-4a13-bce7-0f5b31ff6158","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N","baseScore":8.6,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":4.0}]},"weaknesses":[{"source":"a6d3dc9e-0591-4a13-bce7-0f5b31ff6158","type":"Secondary","description":[{"lang":"en","value":"CWE-918"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:nokia:infinera_mtc-9_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"22.1.1.0275","versionEndExcluding":"23.0","matchCriteriaId":"2C084211-7CFB-4149-BC00-609E29A3EF60"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:nokia:infinera_mtc-9:-:*:*:*:*:*:*:*","matchCriteriaId":"48C75FDC-0C46-4EC4-BCC9-EBAD117A84FD"}]}]}],"references":[{"url":"https://www.cvcn.gov.it/cvcn/cve/CVE-2025-26487","source":"a6d3dc9e-0591-4a13-bce7-0f5b31ff6158","tags":["Third Party Advisory"]}]}}]}