PatchSiren

PatchSiren cyber security CVE debrief

CVE-2025-54808 Oxford Nanopore Technologies CVE debrief

CVE-2025-54808 affects Oxford Nanopore Technologies MinKNOW version 24.11 and earlier. The advisory says MinKNOW stores authentication tokens in a file under the system temporary directory (/tmp), which is typically world-readable on the host. That can let another local user or application read the token. If the token is exposed and Remote Connect is enabled, an attacker can use it to establish unauthorized remote connections to the sequencer. The advisory also notes that this access can be chained to create developer tokens with arbitrary expiration dates, which can support persistent access. This is a local-to-remote risk: the initial exposure depends on local access or local malware, and remote abuse depends on Remote Connect being enabled. CISA published the issue as ICSMA-25-294-01 on 2025-10-21 with a CVSS 3.1 score of 7.8 (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).

Vendor
Oxford Nanopore Technologies
Product
MinKNOW
CVSS
HIGH 7.8
CISA KEV
Not listed in stored evidence
Original CVE published
2025-10-21
Original CVE updated
2025-10-21
Advisory published
2025-10-21
Advisory updated
2025-10-21

Who should care

Operators of MinKNOW-based sequencing systems, lab IT administrators, OT/ICS security teams, and endpoint defenders responsible for hosts running MinKNOW 24.11 or earlier—especially where multiple local users exist or Remote Connect is enabled.

Technical summary

CISA’s CSAF advisory states that MinKNOW at or prior to version 24.11 stores authentication tokens in /tmp on the host machine. Because /tmp is typically world-readable, local users or applications may be able to access the token. Successful remote misuse requires Remote Connect to be enabled; the advisory notes this may be enabled intentionally for operations or by malware with elevated privileges. The source rates the issue CVSS 3.1 7.8 (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).

Defensive priority

High. Upgrade affected systems as soon as possible, and treat any MinKNOW 24.11-or-earlier host with Remote Connect enabled as urgent to review.

Recommended defensive actions

  • Upgrade to MinKNOW versions later than 24.11.
  • Keep Remote Connect disabled unless it is strictly required, and enable it only within trusted network environments.
  • Install and maintain antivirus and malware-scanning tools on affected hosts.
  • If you cannot upgrade immediately, contact Oxford Nanopore Support for configuration guidance.
  • Review MinKNOW hosts for unnecessary local access exposure and investigate any unexpected Remote Connect use or token handling issues.

Evidence notes

The supplied CISA CSAF advisory (ICSMA-25-294-01) and source record were initially published on 2025-10-21, with the same modified date in the provided timeline. The advisory says MinKNOW at or prior to 24.11 stores authentication tokens in /tmp, that /tmp is typically world-readable, that remote misuse requires Remote Connect to be enabled, and that developer tokens can be created with arbitrary expiration dates. The provided CVSS vector is CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H.

Official resources

Publicly disclosed by CISA as ICSMA-25-294-01 on 2025-10-21; the provided source record shows the same initial publication date.