Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12055: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in MPDV Mikrolab GmbH MIP 2

0
Unknown
VulnerabilityCVE-2025-12055cvecve-2025-12055cwe-22
Published: Mon Oct 27 2025 (10/27/2025, 06:36:36 UTC)
Source: CVE Database V5
Vendor/Project: MPDV Mikrolab GmbH
Product: MIP 2

Description

HYDRA X, MIP 2 and FEDRA 2 of MPDV Mikrolab GmbH suffer from an unauthenticated local file disclosure vulnerability in all releases until Maintenance Pack 36 with Servicepack 8 (week 36/2025), which allows an attacker to read arbitrary files from the Windows operating system. The "Filename" parameter of the public $SCHEMAS$ ressource is vulnerable and can be exploited easily.

AI-Powered Analysis

AILast updated: 10/27/2025, 07:06:04 UTC

Technical Analysis

CVE-2025-12055 identifies a path traversal vulnerability (CWE-22) in MPDV Mikrolab GmbH's industrial software products MIP 2, HYDRA X, and FEDRA 2. The vulnerability exists in all releases prior to Maintenance Pack 36 with Servicepack 8 (scheduled for week 36 of 2025). It allows unauthenticated local attackers to manipulate the 'Filename' parameter of the public $SCHEMAS$ resource to access arbitrary files on the underlying Windows operating system. This improper limitation of pathname enables attackers to bypass intended directory restrictions, potentially exposing sensitive configuration files, credentials, or other critical data stored on the host. The vulnerability does not require authentication or user interaction, increasing the risk of exploitation by insiders or attackers with local access. While no public exploits have been reported yet, the flaw's nature suggests it could be weaponized to facilitate further attacks or data leakage. The affected products are commonly used in manufacturing execution systems (MES) and industrial process management, making confidentiality and integrity of data paramount. The vulnerability's resolution depends on applying the vendor's maintenance pack update once available. Until then, organizations must rely on access restrictions and monitoring to mitigate risk.

Potential Impact

For European organizations, especially those in manufacturing and industrial sectors relying on MPDV Mikrolab GmbH's software, this vulnerability poses a significant risk of unauthorized disclosure of sensitive operational data. Exposure of configuration files or credentials could lead to further compromise of industrial control systems or intellectual property theft. The unauthenticated nature of the flaw means that any local user or attacker with access to the system could exploit it, increasing insider threat risks. This could disrupt production processes or lead to regulatory compliance issues under GDPR if personal or sensitive data is exposed. The impact on confidentiality is high, while integrity and availability impacts are indirect but possible if attackers leverage disclosed information for subsequent attacks. The lack of known exploits currently limits immediate widespread impact, but the vulnerability remains a critical concern for organizations with MPDV deployments.

Mitigation Recommendations

Organizations should prioritize the deployment of Maintenance Pack 36 with Servicepack 8 from MPDV Mikrolab GmbH as soon as it becomes available to remediate this vulnerability. Until the patch is applied, strict local access controls must be enforced to limit system access to authorized personnel only, reducing the risk of exploitation. Implementing application whitelisting and monitoring file access patterns can help detect suspicious activity related to path traversal attempts. Network segmentation should isolate affected systems to minimize lateral movement in case of compromise. Regular audits of user privileges and system logs will aid in early detection of exploitation attempts. Additionally, organizations should consider disabling or restricting access to the vulnerable $SCHEMAS$ resource if feasible. Security awareness training for staff about insider threats and local system security best practices will further reduce risk.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
SEC-VLab
Date Reserved
2025-10-22T06:45:51.500Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68ff17d045f6dd1a506a0db6

Added to database: 10/27/2025, 6:57:20 AM

Last enriched: 10/27/2025, 7:06:04 AM

Last updated: 10/27/2025, 10:44:11 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats