CVE-2025-34173: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Netgate pfSense CE
In pfSense CE /usr/local/www/snort/snort_ip_reputation.php, the value of the iplist parameter is not sanitized of directory traversal-related characters/strings before being used to check if a file exists. While the contents of the file cannot be read, the server reveals whether a file exists, which allows an attacker to enumerate files on the target. The attacker must be authenticated with at least "WebCfg - Services: Snort package" permissions.
AI Analysis
Technical Summary
CVE-2025-34173 is a path traversal vulnerability classified under CWE-22 found in the pfSense CE firewall distribution, specifically in the Snort package's web interface file snort_ip_reputation.php. The vulnerability occurs because the iplist parameter is not sanitized to remove directory traversal characters such as '../', allowing an authenticated user with at least 'WebCfg - Services: Snort package' permissions to manipulate the parameter to reference files outside the intended directory. While the vulnerability does not allow reading the contents of arbitrary files, it enables the attacker to check for the existence of files on the server by observing the server's response. This file existence disclosure can be leveraged to enumerate sensitive files, which may reveal configuration files, credentials, or other information useful for further exploitation. The vulnerability has a CVSS 4.0 base score of 5.3 (medium severity), reflecting its network attack vector, low complexity, no user interaction, and limited impact confined to confidentiality through file existence disclosure. Exploitation requires authentication with specific privileges, limiting the attack surface to insiders or compromised accounts. No public exploits or active exploitation have been reported as of the publication date. The affected version is pfSense CE 4.1.6_25. The lack of input validation on the iplist parameter represents a failure to properly restrict pathname access, a common security oversight in web applications handling file paths.
Potential Impact
For European organizations deploying pfSense CE version 4.1.6_25 with the Snort package enabled, this vulnerability presents a moderate risk primarily related to confidentiality. An attacker with authenticated access and the required Snort package permissions can enumerate files on the firewall system, potentially revealing sensitive configuration files or security-related data. This reconnaissance capability can facilitate subsequent attacks such as privilege escalation, configuration manipulation, or targeted exploitation of other vulnerabilities. Although the vulnerability does not allow direct file content disclosure or system compromise, the information gained can reduce the attacker's effort in planning further intrusions. Since pfSense is widely used in small to medium enterprises and some critical infrastructure sectors across Europe for network security, the exposure could affect organizations relying on these firewalls for perimeter defense. The requirement for authentication limits the threat to insiders or attackers who have already compromised user credentials, but given the strategic role of firewalls, any compromise or reconnaissance could have significant operational impact. Additionally, the presence of this vulnerability may undermine compliance with European data protection regulations if sensitive information is indirectly exposed.
Mitigation Recommendations
To mitigate CVE-2025-34173, European organizations should first verify if they are running pfSense CE version 4.1.6_25 with the Snort package enabled. Immediate steps include restricting access to the pfSense web interface to trusted administrators only, enforcing strong authentication mechanisms such as multi-factor authentication to reduce the risk of credential compromise, and limiting the number of users with 'WebCfg - Services: Snort package' permissions. Network segmentation should be employed to isolate management interfaces from general user networks. Although no official patch links are currently available, organizations should monitor Netgate's advisories for updates or patches addressing this vulnerability and apply them promptly once released. As a temporary workaround, administrators can audit and harden the Snort package configuration, disable the Snort package if not essential, or implement web application firewall (WAF) rules to detect and block directory traversal patterns in HTTP requests targeting snort_ip_reputation.php. Regularly reviewing access logs for suspicious activity related to the iplist parameter can help detect attempted exploitation. Finally, organizations should conduct internal security awareness training to prevent credential theft and ensure that only authorized personnel have access to sensitive firewall management functions.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Belgium, Sweden, Finland
CVE-2025-34173: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Netgate pfSense CE
Description
In pfSense CE /usr/local/www/snort/snort_ip_reputation.php, the value of the iplist parameter is not sanitized of directory traversal-related characters/strings before being used to check if a file exists. While the contents of the file cannot be read, the server reveals whether a file exists, which allows an attacker to enumerate files on the target. The attacker must be authenticated with at least "WebCfg - Services: Snort package" permissions.
AI-Powered Analysis
Technical Analysis
CVE-2025-34173 is a path traversal vulnerability classified under CWE-22 found in the pfSense CE firewall distribution, specifically in the Snort package's web interface file snort_ip_reputation.php. The vulnerability occurs because the iplist parameter is not sanitized to remove directory traversal characters such as '../', allowing an authenticated user with at least 'WebCfg - Services: Snort package' permissions to manipulate the parameter to reference files outside the intended directory. While the vulnerability does not allow reading the contents of arbitrary files, it enables the attacker to check for the existence of files on the server by observing the server's response. This file existence disclosure can be leveraged to enumerate sensitive files, which may reveal configuration files, credentials, or other information useful for further exploitation. The vulnerability has a CVSS 4.0 base score of 5.3 (medium severity), reflecting its network attack vector, low complexity, no user interaction, and limited impact confined to confidentiality through file existence disclosure. Exploitation requires authentication with specific privileges, limiting the attack surface to insiders or compromised accounts. No public exploits or active exploitation have been reported as of the publication date. The affected version is pfSense CE 4.1.6_25. The lack of input validation on the iplist parameter represents a failure to properly restrict pathname access, a common security oversight in web applications handling file paths.
Potential Impact
For European organizations deploying pfSense CE version 4.1.6_25 with the Snort package enabled, this vulnerability presents a moderate risk primarily related to confidentiality. An attacker with authenticated access and the required Snort package permissions can enumerate files on the firewall system, potentially revealing sensitive configuration files or security-related data. This reconnaissance capability can facilitate subsequent attacks such as privilege escalation, configuration manipulation, or targeted exploitation of other vulnerabilities. Although the vulnerability does not allow direct file content disclosure or system compromise, the information gained can reduce the attacker's effort in planning further intrusions. Since pfSense is widely used in small to medium enterprises and some critical infrastructure sectors across Europe for network security, the exposure could affect organizations relying on these firewalls for perimeter defense. The requirement for authentication limits the threat to insiders or attackers who have already compromised user credentials, but given the strategic role of firewalls, any compromise or reconnaissance could have significant operational impact. Additionally, the presence of this vulnerability may undermine compliance with European data protection regulations if sensitive information is indirectly exposed.
Mitigation Recommendations
To mitigate CVE-2025-34173, European organizations should first verify if they are running pfSense CE version 4.1.6_25 with the Snort package enabled. Immediate steps include restricting access to the pfSense web interface to trusted administrators only, enforcing strong authentication mechanisms such as multi-factor authentication to reduce the risk of credential compromise, and limiting the number of users with 'WebCfg - Services: Snort package' permissions. Network segmentation should be employed to isolate management interfaces from general user networks. Although no official patch links are currently available, organizations should monitor Netgate's advisories for updates or patches addressing this vulnerability and apply them promptly once released. As a temporary workaround, administrators can audit and harden the Snort package configuration, disable the Snort package if not essential, or implement web application firewall (WAF) rules to detect and block directory traversal patterns in HTTP requests targeting snort_ip_reputation.php. Regularly reviewing access logs for suspicious activity related to the iplist parameter can help detect attempted exploitation. Finally, organizations should conduct internal security awareness training to prevent credential theft and ensure that only authorized personnel have access to sensitive firewall management functions.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulnCheck
- Date Reserved
- 2025-04-15T19:15:22.567Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68c0983c9ed239a66bacc0ee
Added to database: 9/9/2025, 9:12:28 PM
Last enriched: 11/20/2025, 1:32:57 PM
Last updated: 12/15/2025, 2:43:47 AM
Views: 121
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14696: Weak Password Recovery in Shenzhen Sixun Software Sixun Shanghui Group Business Management System
MediumISC Stormcast For Monday, December 15th, 2025 https://isc.sans.edu/podcastdetail/9738, (Mon, Dec 15th)
MediumCVE-2025-14695: Dynamically-Managed Code Resources in SamuNatsu HaloBot
MediumCVE-2025-14694: SQL Injection in ketr JEPaaS
MediumCVE-2025-14693: Symlink Following in Ugreen DH2100+
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.