CVE-2025-34173: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Netgate pfSense CE
In pfSense CE /usr/local/www/snort/snort_ip_reputation.php, the value of the iplist parameter is not sanitized of directory traversal-related characters/strings before being used to check if a file exists. While the contents of the file cannot be read, the server reveals whether a file exists, which allows an attacker to enumerate files on the target. The attacker must be authenticated with at least "WebCfg - Services: Snort package" permissions.
AI Analysis
Technical Summary
CVE-2025-34173 is a medium-severity path traversal vulnerability (CWE-22) identified in Netgate's pfSense CE version 4.1.6_25, specifically within the Snort package web interface component located at /usr/local/www/snort/snort_ip_reputation.php. The vulnerability arises because the 'iplist' parameter is not properly sanitized to remove directory traversal characters or strings before it is used in a file existence check. Although the vulnerability does not allow direct reading of file contents, it enables an authenticated attacker with at least 'WebCfg - Services: Snort package' permissions to enumerate files on the server by probing for their existence. This file enumeration can reveal sensitive information about the server's file structure, potentially aiding further attacks such as privilege escalation or targeted exploitation. The vulnerability requires no user interaction beyond authentication and has a CVSS 4.0 base score of 5.3, reflecting its moderate impact and relatively low complexity to exploit. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability does not affect confidentiality or integrity directly but impacts information disclosure through file existence enumeration, which can be leveraged in multi-stage attacks.
Potential Impact
For European organizations using pfSense CE 4.1.6_25 with the Snort package enabled, this vulnerability poses a moderate risk. The ability to enumerate files on the firewall or IDS/IPS system can provide attackers with valuable intelligence about system configuration, installed software, and potentially sensitive files. This information can facilitate further targeted attacks, including privilege escalation or lateral movement within the network. Since pfSense is widely used in enterprise and governmental network perimeter defenses across Europe, exploitation could undermine network security posture. The requirement for authenticated access limits the attack surface to insiders or compromised accounts, but insider threats or credential theft remain realistic risks. Organizations in critical infrastructure sectors, finance, healthcare, and government are particularly sensitive to such reconnaissance capabilities as they may lead to more severe breaches.
Mitigation Recommendations
European organizations should implement the following specific mitigations: 1) Immediately review and restrict access to the Snort package web interface to trusted administrators only, enforcing strong authentication and multi-factor authentication (MFA) to reduce the risk of credential compromise. 2) Monitor and audit all access logs for unusual or unauthorized attempts to access or enumerate files via the 'iplist' parameter. 3) Apply strict input validation and sanitization on the 'iplist' parameter within pfSense CE, either by upgrading to a patched version once available or by implementing custom web application firewall (WAF) rules to block directory traversal patterns targeting this endpoint. 4) Limit the permissions of accounts with 'WebCfg - Services: Snort package' rights to only those absolutely necessary. 5) Employ network segmentation to isolate management interfaces from general user networks to reduce exposure. 6) Stay informed on vendor advisories for patches or updates addressing this vulnerability and apply them promptly when released.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Belgium, Sweden, Finland
CVE-2025-34173: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Netgate pfSense CE
Description
In pfSense CE /usr/local/www/snort/snort_ip_reputation.php, the value of the iplist parameter is not sanitized of directory traversal-related characters/strings before being used to check if a file exists. While the contents of the file cannot be read, the server reveals whether a file exists, which allows an attacker to enumerate files on the target. The attacker must be authenticated with at least "WebCfg - Services: Snort package" permissions.
AI-Powered Analysis
Technical Analysis
CVE-2025-34173 is a medium-severity path traversal vulnerability (CWE-22) identified in Netgate's pfSense CE version 4.1.6_25, specifically within the Snort package web interface component located at /usr/local/www/snort/snort_ip_reputation.php. The vulnerability arises because the 'iplist' parameter is not properly sanitized to remove directory traversal characters or strings before it is used in a file existence check. Although the vulnerability does not allow direct reading of file contents, it enables an authenticated attacker with at least 'WebCfg - Services: Snort package' permissions to enumerate files on the server by probing for their existence. This file enumeration can reveal sensitive information about the server's file structure, potentially aiding further attacks such as privilege escalation or targeted exploitation. The vulnerability requires no user interaction beyond authentication and has a CVSS 4.0 base score of 5.3, reflecting its moderate impact and relatively low complexity to exploit. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability does not affect confidentiality or integrity directly but impacts information disclosure through file existence enumeration, which can be leveraged in multi-stage attacks.
Potential Impact
For European organizations using pfSense CE 4.1.6_25 with the Snort package enabled, this vulnerability poses a moderate risk. The ability to enumerate files on the firewall or IDS/IPS system can provide attackers with valuable intelligence about system configuration, installed software, and potentially sensitive files. This information can facilitate further targeted attacks, including privilege escalation or lateral movement within the network. Since pfSense is widely used in enterprise and governmental network perimeter defenses across Europe, exploitation could undermine network security posture. The requirement for authenticated access limits the attack surface to insiders or compromised accounts, but insider threats or credential theft remain realistic risks. Organizations in critical infrastructure sectors, finance, healthcare, and government are particularly sensitive to such reconnaissance capabilities as they may lead to more severe breaches.
Mitigation Recommendations
European organizations should implement the following specific mitigations: 1) Immediately review and restrict access to the Snort package web interface to trusted administrators only, enforcing strong authentication and multi-factor authentication (MFA) to reduce the risk of credential compromise. 2) Monitor and audit all access logs for unusual or unauthorized attempts to access or enumerate files via the 'iplist' parameter. 3) Apply strict input validation and sanitization on the 'iplist' parameter within pfSense CE, either by upgrading to a patched version once available or by implementing custom web application firewall (WAF) rules to block directory traversal patterns targeting this endpoint. 4) Limit the permissions of accounts with 'WebCfg - Services: Snort package' rights to only those absolutely necessary. 5) Employ network segmentation to isolate management interfaces from general user networks to reduce exposure. 6) Stay informed on vendor advisories for patches or updates addressing this vulnerability and apply them promptly when released.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulnCheck
- Date Reserved
- 2025-04-15T19:15:22.567Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68c0983c9ed239a66bacc0ee
Added to database: 9/9/2025, 9:12:28 PM
Last enriched: 9/9/2025, 9:12:46 PM
Last updated: 9/10/2025, 4:07:21 AM
Views: 4
Related Threats
CVE-2025-8388: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ideaboxcreations PowerPack Elementor Addons (Free Widgets, Extensions and Templates)
MediumCVE-2025-59038: CWE-506: Embedded Malicious Code in prebid Prebid.js
HighCVE-2025-10197: SQL Injection in HJSoft HCM Human Resources Management System
MediumCVE-2025-10195: Improper Export of Android Application Components in Seismic App
MediumCVE-2025-21417: CWE-122: Heap-based Buffer Overflow in Microsoft Windows 10 Version 1809
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.