CVE-2025-34112: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Riverbed Technology SteelCentral NetExpress
An authenticated multi-stage remote code execution vulnerability exists in Riverbed SteelCentral NetProfiler and NetExpress 10.8.7 virtual appliances. A SQL injection vulnerability in the '/api/common/1.0/login' endpoint can be exploited to create a new user account in the appliance database. This user can then trigger a command injection vulnerability in the '/index.php?page=licenses' endpoint to execute arbitrary commands. The attacker may escalate privileges to root by exploiting an insecure sudoers configuration that allows the 'mazu' user to execute arbitrary commands as root via SSH key extraction and command chaining. Successful exploitation allows full remote root access to the virtual appliance.
AI Analysis
Technical Summary
This vulnerability chain in Riverbed SteelCentral NetExpress 10.8.7 involves an authenticated SQL injection (CWE-89) in the login API endpoint that enables attacker-controlled creation of a new user. The attacker then leverages a command injection flaw (CWE-78) in the licenses page to execute arbitrary commands. Privilege escalation to root is possible due to an insecure sudoers configuration (CWE-306) allowing the 'mazu' user to execute commands as root, combined with SSH key extraction and command chaining (CWE-266). The CVSS 4.0 base score is 10.0 (critical), reflecting network attack vector, no required privileges or user interaction, and high impact on confidentiality, integrity, availability, and security requirements. The vulnerability affects version 10.8.7 of the product. No patch or official remediation guidance is currently available.
Potential Impact
Successful exploitation grants an attacker full remote root access to the SteelCentral NetExpress virtual appliance, enabling complete control over the system. This includes the ability to create new user accounts, execute arbitrary commands, and escalate privileges to root. The impact is critical, potentially compromising the confidentiality, integrity, and availability of the appliance and any data or services it manages.
Mitigation Recommendations
Patch status is not yet confirmed — check the vendor advisory for current remediation guidance. Until an official fix is available, restrict access to the affected endpoints to trusted users only and monitor for suspicious activity related to user creation and command execution. Consider disabling or restricting the 'mazu' user and reviewing sudoers configurations to limit privilege escalation opportunities.
CVE-2025-34112: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Riverbed Technology SteelCentral NetExpress
Description
An authenticated multi-stage remote code execution vulnerability exists in Riverbed SteelCentral NetProfiler and NetExpress 10.8.7 virtual appliances. A SQL injection vulnerability in the '/api/common/1.0/login' endpoint can be exploited to create a new user account in the appliance database. This user can then trigger a command injection vulnerability in the '/index.php?page=licenses' endpoint to execute arbitrary commands. The attacker may escalate privileges to root by exploiting an insecure sudoers configuration that allows the 'mazu' user to execute arbitrary commands as root via SSH key extraction and command chaining. Successful exploitation allows full remote root access to the virtual appliance.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
This vulnerability chain in Riverbed SteelCentral NetExpress 10.8.7 involves an authenticated SQL injection (CWE-89) in the login API endpoint that enables attacker-controlled creation of a new user. The attacker then leverages a command injection flaw (CWE-78) in the licenses page to execute arbitrary commands. Privilege escalation to root is possible due to an insecure sudoers configuration (CWE-306) allowing the 'mazu' user to execute commands as root, combined with SSH key extraction and command chaining (CWE-266). The CVSS 4.0 base score is 10.0 (critical), reflecting network attack vector, no required privileges or user interaction, and high impact on confidentiality, integrity, availability, and security requirements. The vulnerability affects version 10.8.7 of the product. No patch or official remediation guidance is currently available.
Potential Impact
Successful exploitation grants an attacker full remote root access to the SteelCentral NetExpress virtual appliance, enabling complete control over the system. This includes the ability to create new user accounts, execute arbitrary commands, and escalate privileges to root. The impact is critical, potentially compromising the confidentiality, integrity, and availability of the appliance and any data or services it manages.
Mitigation Recommendations
Patch status is not yet confirmed — check the vendor advisory for current remediation guidance. Until an official fix is available, restrict access to the affected endpoints to trusted users only and monitor for suspicious activity related to user creation and command execution. Consider disabling or restricting the 'mazu' user and reviewing sudoers configurations to limit privilege escalation opportunities.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulnCheck
- Date Reserved
- 2025-04-15T19:15:22.560Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 687654a5a83201eaaccea536
Added to database: 7/15/2025, 1:16:21 PM
Last enriched: 4/7/2026, 11:03:24 PM
Last updated: 5/9/2026, 1:56:26 AM
Views: 168
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.