Skip to main content

CVE-2025-3223: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in GE Vernova WorkstationST

Medium
VulnerabilityCVE-2025-3223cvecve-2025-3223cwe-22
Published: Mon May 19 2025 (05/19/2025, 21:03:32 UTC)
Source: CVE
Vendor/Project: GE Vernova
Product: WorkstationST

Description

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in GE Vernova WorkstationST on Windows (EGD Configuration Server modules) allows Path Traversal.This issue affects WorkstationST: WorkstationST V07.10.10C and earlier.

AI-Powered Analysis

AILast updated: 07/11/2025, 14:18:35 UTC

Technical Analysis

CVE-2025-3223 is a medium-severity vulnerability classified under CWE-22, which pertains to improper limitation of a pathname to a restricted directory, commonly known as a path traversal vulnerability. This vulnerability affects GE Vernova's WorkstationST software, specifically versions V07.10.10C and earlier, running on Windows platforms. The affected component is the EGD Configuration Server modules within WorkstationST. Path traversal vulnerabilities allow an attacker to manipulate file paths to access files and directories outside the intended restricted directory. This can lead to unauthorized reading, modification, or execution of files, potentially compromising system integrity and confidentiality. The CVSS v3.1 base score for this vulnerability is 5.9, indicating a medium severity level. The vector string (CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:L) reveals that the attack vector is adjacent network (AV:A), requiring low privileges (PR:L) but high attack complexity (AC:H), with no user interaction (UI:N). The impact affects confidentiality (low), integrity (high), and availability (low), and the scope is unchanged (S:U). No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability arises because the software does not properly restrict pathname inputs, allowing attackers to traverse directories and potentially access or modify files beyond the intended scope. This can lead to unauthorized data manipulation or disclosure, which is critical in industrial control or energy management environments where GE Vernova products are typically deployed.

Potential Impact

For European organizations, particularly those in critical infrastructure sectors such as energy, utilities, and industrial automation, this vulnerability poses a significant risk. GE Vernova's WorkstationST is likely used in operational technology (OT) environments managing energy distribution or industrial processes. Exploitation could allow attackers to alter configuration files or access sensitive operational data, potentially disrupting service availability or causing incorrect system behavior. This could lead to operational downtime, safety incidents, or data breaches. Given the medium severity and the requirement for adjacent network access and low privileges, attackers with limited access to the network segment could exploit this vulnerability to escalate their control or cause damage. The lack of user interaction needed increases the risk of automated exploitation in targeted environments. European organizations with interconnected IT and OT networks are particularly vulnerable, as lateral movement within networks could facilitate exploitation. The confidentiality impact, while low, still raises concerns for sensitive operational data exposure, and the high integrity impact could lead to manipulation of critical system configurations.

Mitigation Recommendations

Organizations should immediately conduct an inventory to identify all instances of GE Vernova WorkstationST, especially versions V07.10.10C and earlier. Network segmentation should be enforced to restrict access to the EGD Configuration Server modules, limiting adjacency network exposure. Implement strict access controls and monitoring on systems running WorkstationST to detect unusual file access patterns indicative of path traversal attempts. Employ application-layer firewalls or intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics targeting path traversal exploits. Until official patches are released, consider deploying virtual patching or compensating controls such as input validation proxies to sanitize pathname inputs. Regularly review and harden file system permissions to minimize the impact of unauthorized file access. Additionally, conduct security awareness and training for OT and IT staff to recognize signs of exploitation and maintain incident response readiness. Engage with GE Vernova support channels for timely updates and patches. Finally, maintain up-to-date backups of critical configuration files to enable recovery in case of integrity compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GE_Vernova
Date Reserved
2025-04-03T13:57:26.486Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f71484d88663aeb16f

Added to database: 5/20/2025, 6:59:03 PM

Last enriched: 7/11/2025, 2:18:35 PM

Last updated: 8/12/2025, 4:30:14 PM

Views: 26

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats