Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-34112: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Riverbed Technology SteelCentral NetExpress

0
Critical
Published: Tue Jul 15 2025 (07/15/2025, 13:07:31 UTC)
Source: CVE Database V5
Vendor/Project: Riverbed Technology
Product: SteelCentral NetExpress

Description

An authenticated multi-stage remote code execution vulnerability exists in Riverbed SteelCentral NetProfiler and NetExpress 10.8.7 virtual appliances. A SQL injection vulnerability in the '/api/common/1.0/login' endpoint can be exploited to create a new user account in the appliance database. This user can then trigger a command injection vulnerability in the '/index.php?page=licenses' endpoint to execute arbitrary commands. The attacker may escalate privileges to root by exploiting an insecure sudoers configuration that allows the 'mazu' user to execute arbitrary commands as root via SSH key extraction and command chaining. Successful exploitation allows full remote root access to the virtual appliance.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/07/2026, 23:03:24 UTC

Technical Analysis

This vulnerability chain in Riverbed SteelCentral NetExpress 10.8.7 involves an authenticated SQL injection (CWE-89) in the login API endpoint that enables attacker-controlled creation of a new user. The attacker then leverages a command injection flaw (CWE-78) in the licenses page to execute arbitrary commands. Privilege escalation to root is possible due to an insecure sudoers configuration (CWE-306) allowing the 'mazu' user to execute commands as root, combined with SSH key extraction and command chaining (CWE-266). The CVSS 4.0 base score is 10.0 (critical), reflecting network attack vector, no required privileges or user interaction, and high impact on confidentiality, integrity, availability, and security requirements. The vulnerability affects version 10.8.7 of the product. No patch or official remediation guidance is currently available.

Potential Impact

Successful exploitation grants an attacker full remote root access to the SteelCentral NetExpress virtual appliance, enabling complete control over the system. This includes the ability to create new user accounts, execute arbitrary commands, and escalate privileges to root. The impact is critical, potentially compromising the confidentiality, integrity, and availability of the appliance and any data or services it manages.

Mitigation Recommendations

Patch status is not yet confirmed — check the vendor advisory for current remediation guidance. Until an official fix is available, restrict access to the affected endpoints to trusted users only and monitor for suspicious activity related to user creation and command execution. Consider disabling or restricting the 'mazu' user and reviewing sudoers configurations to limit privilege escalation opportunities.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulnCheck
Date Reserved
2025-04-15T19:15:22.560Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 687654a5a83201eaaccea536

Added to database: 7/15/2025, 1:16:21 PM

Last enriched: 4/7/2026, 11:03:24 PM

Last updated: 5/9/2026, 1:56:26 AM

Views: 168

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses