CVE-2025-34173: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Netgate pfSense CE
In pfSense CE /usr/local/www/snort/snort_ip_reputation.php, the value of the iplist parameter is not sanitized of directory traversal-related characters/strings before being used to check if a file exists. While the contents of the file cannot be read, the server reveals whether a file exists, which allows an attacker to enumerate files on the target. The attacker must be authenticated with at least "WebCfg - Services: Snort package" permissions.
AI Analysis
Technical Summary
CVE-2025-34173 is a medium-severity path traversal vulnerability identified in the pfSense CE product, specifically in version 4.1.6_25. The vulnerability exists in the /usr/local/www/snort/snort_ip_reputation.php script, where the 'iplist' parameter is not properly sanitized to remove directory traversal characters or strings. This improper input validation allows an authenticated attacker with at least "WebCfg - Services: Snort package" permissions to manipulate the parameter to check for the existence of arbitrary files on the server. Although the attacker cannot read the contents of these files, the server's response reveals whether a file exists or not, enabling file enumeration on the target system. The vulnerability does not require user interaction and can be exploited remotely over the network (AV:N) with low attack complexity (AC:L). It requires privileges (PR:L) but no additional authentication beyond the specified permission level. The impact on confidentiality is limited to information disclosure about file existence (VC:L), with no direct impact on integrity or availability. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability is classified under CWE-22, which relates to improper limitation of a pathname to a restricted directory, commonly known as path traversal.
Potential Impact
For European organizations using pfSense CE version 4.1.6_25 with the Snort package enabled, this vulnerability presents a moderate risk. The ability to enumerate files on the firewall or security appliance can aid attackers in gathering intelligence about the system's file structure, potentially revealing sensitive configuration files or system information that could be leveraged in further attacks. While direct reading of file contents is not possible, the information disclosure can facilitate targeted attacks or privilege escalation attempts. Given that pfSense is widely used in small to medium enterprises and some larger organizations across Europe for network security and firewalling, the exposure could affect critical network infrastructure. Attackers with valid credentials or compromised accounts with Snort package permissions could exploit this vulnerability remotely, increasing the risk of lateral movement or reconnaissance within the network. However, the requirement for authenticated access limits the threat to insiders or attackers who have already breached perimeter defenses.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should: 1) Immediately review and restrict access to the Snort package configuration interface, ensuring only trusted administrators have the "WebCfg - Services: Snort package" permissions. 2) Implement strong authentication mechanisms, including multi-factor authentication (MFA), to reduce the risk of credential compromise. 3) Monitor logs for unusual access patterns or repeated attempts to manipulate the 'iplist' parameter indicative of file enumeration attempts. 4) Apply any available patches or updates from Netgate as soon as they are released; if no patch is currently available, consider temporarily disabling the Snort package web interface or restricting its access via network segmentation or firewall rules. 5) Conduct regular security audits and penetration tests focusing on web interface vulnerabilities and privilege management. 6) Educate administrators about the risks of path traversal vulnerabilities and the importance of input validation in web applications.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Poland
CVE-2025-34173: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Netgate pfSense CE
Description
In pfSense CE /usr/local/www/snort/snort_ip_reputation.php, the value of the iplist parameter is not sanitized of directory traversal-related characters/strings before being used to check if a file exists. While the contents of the file cannot be read, the server reveals whether a file exists, which allows an attacker to enumerate files on the target. The attacker must be authenticated with at least "WebCfg - Services: Snort package" permissions.
AI-Powered Analysis
Technical Analysis
CVE-2025-34173 is a medium-severity path traversal vulnerability identified in the pfSense CE product, specifically in version 4.1.6_25. The vulnerability exists in the /usr/local/www/snort/snort_ip_reputation.php script, where the 'iplist' parameter is not properly sanitized to remove directory traversal characters or strings. This improper input validation allows an authenticated attacker with at least "WebCfg - Services: Snort package" permissions to manipulate the parameter to check for the existence of arbitrary files on the server. Although the attacker cannot read the contents of these files, the server's response reveals whether a file exists or not, enabling file enumeration on the target system. The vulnerability does not require user interaction and can be exploited remotely over the network (AV:N) with low attack complexity (AC:L). It requires privileges (PR:L) but no additional authentication beyond the specified permission level. The impact on confidentiality is limited to information disclosure about file existence (VC:L), with no direct impact on integrity or availability. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability is classified under CWE-22, which relates to improper limitation of a pathname to a restricted directory, commonly known as path traversal.
Potential Impact
For European organizations using pfSense CE version 4.1.6_25 with the Snort package enabled, this vulnerability presents a moderate risk. The ability to enumerate files on the firewall or security appliance can aid attackers in gathering intelligence about the system's file structure, potentially revealing sensitive configuration files or system information that could be leveraged in further attacks. While direct reading of file contents is not possible, the information disclosure can facilitate targeted attacks or privilege escalation attempts. Given that pfSense is widely used in small to medium enterprises and some larger organizations across Europe for network security and firewalling, the exposure could affect critical network infrastructure. Attackers with valid credentials or compromised accounts with Snort package permissions could exploit this vulnerability remotely, increasing the risk of lateral movement or reconnaissance within the network. However, the requirement for authenticated access limits the threat to insiders or attackers who have already breached perimeter defenses.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should: 1) Immediately review and restrict access to the Snort package configuration interface, ensuring only trusted administrators have the "WebCfg - Services: Snort package" permissions. 2) Implement strong authentication mechanisms, including multi-factor authentication (MFA), to reduce the risk of credential compromise. 3) Monitor logs for unusual access patterns or repeated attempts to manipulate the 'iplist' parameter indicative of file enumeration attempts. 4) Apply any available patches or updates from Netgate as soon as they are released; if no patch is currently available, consider temporarily disabling the Snort package web interface or restricting its access via network segmentation or firewall rules. 5) Conduct regular security audits and penetration tests focusing on web interface vulnerabilities and privilege management. 6) Educate administrators about the risks of path traversal vulnerabilities and the importance of input validation in web applications.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulnCheck
- Date Reserved
- 2025-04-15T19:15:22.567Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68c0983c9ed239a66bacc0ee
Added to database: 9/9/2025, 9:12:28 PM
Last enriched: 9/24/2025, 1:08:14 AM
Last updated: 10/30/2025, 11:47:47 AM
Views: 65
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
Canada Says Hackers Tampered With ICS at Water Facility, Oil and Gas Firm
MediumCVE-2025-39663: CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in Checkmk GmbH Checkmk
HighCVE-2025-53883: CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in SUSE Container suse manager 5.0
Critical136 NPM Packages Delivering Infostealers Downloaded 100,000 Times
MediumCVE-2025-53880: CWE-35: Path Traversal in SUSE Container suse/manager/4.3/proxy-httpd:latest
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.