CVE-2025-12055: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in MPDV Mikrolab GmbH MIP 2
HYDRA X, MIP 2 and FEDRA 2 of MPDV Mikrolab GmbH suffer from an unauthenticated local file disclosure vulnerability in all releases until Maintenance Pack 36 with Servicepack 8 (week 36/2025), which allows an attacker to read arbitrary files from the Windows operating system. The "Filename" parameter of the public $SCHEMAS$ ressource is vulnerable and can be exploited easily.
AI Analysis
Technical Summary
CVE-2025-12055 identifies a path traversal vulnerability (CWE-22) in MPDV Mikrolab GmbH's industrial software products MIP 2, HYDRA X, and FEDRA 2. The vulnerability exists in all releases prior to Maintenance Pack 36 with Servicepack 8 (scheduled for week 36 of 2025). It allows unauthenticated local attackers to manipulate the 'Filename' parameter of the public $SCHEMAS$ resource to access arbitrary files on the underlying Windows operating system. This improper limitation of pathname enables attackers to bypass intended directory restrictions, potentially exposing sensitive configuration files, credentials, or other critical data stored on the host. The vulnerability does not require authentication or user interaction, increasing the risk of exploitation by insiders or attackers with local access. While no public exploits have been reported yet, the flaw's nature suggests it could be weaponized to facilitate further attacks or data leakage. The affected products are commonly used in manufacturing execution systems (MES) and industrial process management, making confidentiality and integrity of data paramount. The vulnerability's resolution depends on applying the vendor's maintenance pack update once available. Until then, organizations must rely on access restrictions and monitoring to mitigate risk.
Potential Impact
For European organizations, especially those in manufacturing and industrial sectors relying on MPDV Mikrolab GmbH's software, this vulnerability poses a significant risk of unauthorized disclosure of sensitive operational data. Exposure of configuration files or credentials could lead to further compromise of industrial control systems or intellectual property theft. The unauthenticated nature of the flaw means that any local user or attacker with access to the system could exploit it, increasing insider threat risks. This could disrupt production processes or lead to regulatory compliance issues under GDPR if personal or sensitive data is exposed. The impact on confidentiality is high, while integrity and availability impacts are indirect but possible if attackers leverage disclosed information for subsequent attacks. The lack of known exploits currently limits immediate widespread impact, but the vulnerability remains a critical concern for organizations with MPDV deployments.
Mitigation Recommendations
Organizations should prioritize the deployment of Maintenance Pack 36 with Servicepack 8 from MPDV Mikrolab GmbH as soon as it becomes available to remediate this vulnerability. Until the patch is applied, strict local access controls must be enforced to limit system access to authorized personnel only, reducing the risk of exploitation. Implementing application whitelisting and monitoring file access patterns can help detect suspicious activity related to path traversal attempts. Network segmentation should isolate affected systems to minimize lateral movement in case of compromise. Regular audits of user privileges and system logs will aid in early detection of exploitation attempts. Additionally, organizations should consider disabling or restricting access to the vulnerable $SCHEMAS$ resource if feasible. Security awareness training for staff about insider threats and local system security best practices will further reduce risk.
Affected Countries
Germany, France, Italy, Belgium, Netherlands
CVE-2025-12055: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in MPDV Mikrolab GmbH MIP 2
Description
HYDRA X, MIP 2 and FEDRA 2 of MPDV Mikrolab GmbH suffer from an unauthenticated local file disclosure vulnerability in all releases until Maintenance Pack 36 with Servicepack 8 (week 36/2025), which allows an attacker to read arbitrary files from the Windows operating system. The "Filename" parameter of the public $SCHEMAS$ ressource is vulnerable and can be exploited easily.
AI-Powered Analysis
Technical Analysis
CVE-2025-12055 identifies a path traversal vulnerability (CWE-22) in MPDV Mikrolab GmbH's industrial software products MIP 2, HYDRA X, and FEDRA 2. The vulnerability exists in all releases prior to Maintenance Pack 36 with Servicepack 8 (scheduled for week 36 of 2025). It allows unauthenticated local attackers to manipulate the 'Filename' parameter of the public $SCHEMAS$ resource to access arbitrary files on the underlying Windows operating system. This improper limitation of pathname enables attackers to bypass intended directory restrictions, potentially exposing sensitive configuration files, credentials, or other critical data stored on the host. The vulnerability does not require authentication or user interaction, increasing the risk of exploitation by insiders or attackers with local access. While no public exploits have been reported yet, the flaw's nature suggests it could be weaponized to facilitate further attacks or data leakage. The affected products are commonly used in manufacturing execution systems (MES) and industrial process management, making confidentiality and integrity of data paramount. The vulnerability's resolution depends on applying the vendor's maintenance pack update once available. Until then, organizations must rely on access restrictions and monitoring to mitigate risk.
Potential Impact
For European organizations, especially those in manufacturing and industrial sectors relying on MPDV Mikrolab GmbH's software, this vulnerability poses a significant risk of unauthorized disclosure of sensitive operational data. Exposure of configuration files or credentials could lead to further compromise of industrial control systems or intellectual property theft. The unauthenticated nature of the flaw means that any local user or attacker with access to the system could exploit it, increasing insider threat risks. This could disrupt production processes or lead to regulatory compliance issues under GDPR if personal or sensitive data is exposed. The impact on confidentiality is high, while integrity and availability impacts are indirect but possible if attackers leverage disclosed information for subsequent attacks. The lack of known exploits currently limits immediate widespread impact, but the vulnerability remains a critical concern for organizations with MPDV deployments.
Mitigation Recommendations
Organizations should prioritize the deployment of Maintenance Pack 36 with Servicepack 8 from MPDV Mikrolab GmbH as soon as it becomes available to remediate this vulnerability. Until the patch is applied, strict local access controls must be enforced to limit system access to authorized personnel only, reducing the risk of exploitation. Implementing application whitelisting and monitoring file access patterns can help detect suspicious activity related to path traversal attempts. Network segmentation should isolate affected systems to minimize lateral movement in case of compromise. Regular audits of user privileges and system logs will aid in early detection of exploitation attempts. Additionally, organizations should consider disabling or restricting access to the vulnerable $SCHEMAS$ resource if feasible. Security awareness training for staff about insider threats and local system security best practices will further reduce risk.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- SEC-VLab
- Date Reserved
- 2025-10-22T06:45:51.500Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 68ff17d045f6dd1a506a0db6
Added to database: 10/27/2025, 6:57:20 AM
Last enriched: 10/27/2025, 7:06:04 AM
Last updated: 10/27/2025, 10:44:11 AM
Views: 4
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-59463: CWE-833 Deadlock in SICK AG TLOC100-100 all Firmware versions
MediumCVE-2025-59462: CWE-248 Uncaught Exception in SICK AG TLOC100-100 all Firmware versions
MediumCVE-2025-59461: CWE-862 Missing Authorization in SICK AG TLOC100-100 all Firmware versions
HighCVE-2025-59460: CWE-1391 Use of Weak Credentials in SICK AG TLOC100-100 with Firmware <7.1.1
HighCVE-2025-59459: CWE-770 Allocation of Resources Without Limits or Throttling in SICK AG TLOC100-100 with Firmware <7.1.1
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.