Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-34173: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Netgate pfSense CE

0
Medium
VulnerabilityCVE-2025-34173cvecve-2025-34173cwe-22
Published: Tue Sep 09 2025 (09/09/2025, 19:59:14 UTC)
Source: CVE Database V5
Vendor/Project: Netgate
Product: pfSense CE

Description

In pfSense CE /usr/local/www/snort/snort_ip_reputation.php, the value of the iplist parameter is not sanitized of directory traversal-related characters/strings before being used to check if a file exists. While the contents of the file cannot be read, the server reveals whether a file exists, which allows an attacker to enumerate files on the target. The attacker must be authenticated with at least "WebCfg - Services: Snort package" permissions.

AI-Powered Analysis

AILast updated: 09/24/2025, 01:08:14 UTC

Technical Analysis

CVE-2025-34173 is a medium-severity path traversal vulnerability identified in the pfSense CE product, specifically in version 4.1.6_25. The vulnerability exists in the /usr/local/www/snort/snort_ip_reputation.php script, where the 'iplist' parameter is not properly sanitized to remove directory traversal characters or strings. This improper input validation allows an authenticated attacker with at least "WebCfg - Services: Snort package" permissions to manipulate the parameter to check for the existence of arbitrary files on the server. Although the attacker cannot read the contents of these files, the server's response reveals whether a file exists or not, enabling file enumeration on the target system. The vulnerability does not require user interaction and can be exploited remotely over the network (AV:N) with low attack complexity (AC:L). It requires privileges (PR:L) but no additional authentication beyond the specified permission level. The impact on confidentiality is limited to information disclosure about file existence (VC:L), with no direct impact on integrity or availability. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability is classified under CWE-22, which relates to improper limitation of a pathname to a restricted directory, commonly known as path traversal.

Potential Impact

For European organizations using pfSense CE version 4.1.6_25 with the Snort package enabled, this vulnerability presents a moderate risk. The ability to enumerate files on the firewall or security appliance can aid attackers in gathering intelligence about the system's file structure, potentially revealing sensitive configuration files or system information that could be leveraged in further attacks. While direct reading of file contents is not possible, the information disclosure can facilitate targeted attacks or privilege escalation attempts. Given that pfSense is widely used in small to medium enterprises and some larger organizations across Europe for network security and firewalling, the exposure could affect critical network infrastructure. Attackers with valid credentials or compromised accounts with Snort package permissions could exploit this vulnerability remotely, increasing the risk of lateral movement or reconnaissance within the network. However, the requirement for authenticated access limits the threat to insiders or attackers who have already breached perimeter defenses.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should: 1) Immediately review and restrict access to the Snort package configuration interface, ensuring only trusted administrators have the "WebCfg - Services: Snort package" permissions. 2) Implement strong authentication mechanisms, including multi-factor authentication (MFA), to reduce the risk of credential compromise. 3) Monitor logs for unusual access patterns or repeated attempts to manipulate the 'iplist' parameter indicative of file enumeration attempts. 4) Apply any available patches or updates from Netgate as soon as they are released; if no patch is currently available, consider temporarily disabling the Snort package web interface or restricting its access via network segmentation or firewall rules. 5) Conduct regular security audits and penetration tests focusing on web interface vulnerabilities and privilege management. 6) Educate administrators about the risks of path traversal vulnerabilities and the importance of input validation in web applications.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulnCheck
Date Reserved
2025-04-15T19:15:22.567Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68c0983c9ed239a66bacc0ee

Added to database: 9/9/2025, 9:12:28 PM

Last enriched: 9/24/2025, 1:08:14 AM

Last updated: 10/30/2025, 11:47:47 AM

Views: 65

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats