Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-34176: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Netgate pfSense CE

0
Medium
VulnerabilityCVE-2025-34176cvecve-2025-34176cwe-22
Published: Tue Sep 09 2025 (09/09/2025, 20:14:37 UTC)
Source: CVE Database V5
Vendor/Project: Netgate
Product: pfSense CE

Description

CVE-2025-34176 is a medium-severity path traversal vulnerability in Netgate pfSense CE version 7. 0. 8_2 affecting the Suricata package web interface. An authenticated attacker with at least 'WebCfg - Services: suricata package' permissions can manipulate the 'iplist' parameter in suricata_ip_reputation. php to perform directory traversal. Although the attacker cannot read file contents, they can determine the existence of arbitrary files on the server, enabling file enumeration. This vulnerability does not require user interaction and has a CVSS 4. 0 base score of 5. 3. No known exploits are currently in the wild, and no patches have been published yet.

AI-Powered Analysis

AILast updated: 11/27/2025, 12:55:09 UTC

Technical Analysis

CVE-2025-34176 is a path traversal vulnerability classified under CWE-22 found in the Netgate pfSense CE firewall distribution, specifically in the Suricata intrusion detection/prevention package's web interface script suricata_ip_reputation.php. The vulnerability arises because the 'iplist' parameter is not properly sanitized against directory traversal sequences such as '../'. This parameter is used in a file existence check operation without adequate validation, allowing an attacker to traverse directories and check for the presence of arbitrary files on the server filesystem. While the vulnerability does not allow reading file contents or modifying files, the ability to enumerate files can aid attackers in gathering sensitive information about the server environment, potentially facilitating further attacks. Exploitation requires the attacker to be authenticated with at least 'WebCfg - Services: suricata package' permissions, which limits the attack surface to users with some level of administrative access to the Suricata service configuration. The vulnerability has a CVSS 4.0 score of 5.3, reflecting a medium severity due to network attack vector, low complexity, no user interaction, and limited impact confined to information disclosure. There are no known public exploits or patches at the time of publication, but the issue is publicly disclosed and should be addressed promptly. This vulnerability highlights the importance of input validation in web interfaces of security appliances, especially those exposed to administrative users.

Potential Impact

For European organizations, the primary impact of this vulnerability is information disclosure through file enumeration on pfSense CE firewalls running Suricata. Attackers with authenticated access to the Suricata web interface can map the filesystem structure, potentially revealing configuration files, logs, or other sensitive files that could aid in further attacks or lateral movement within the network. While direct compromise or data modification is not possible via this vulnerability alone, the information gained could reduce the effort required for privilege escalation or targeted attacks. Organizations relying on pfSense CE for perimeter or internal network security may face increased risk if attackers can leverage this vulnerability to better understand their environment. This is particularly relevant for critical infrastructure, financial institutions, and government agencies in Europe that use pfSense CE as part of their security stack. The requirement for authenticated access somewhat limits the risk to insider threats or attackers who have already compromised low-privilege credentials. However, given the widespread use of pfSense CE in Europe, the vulnerability could be exploited in targeted attacks or insider threat scenarios.

Mitigation Recommendations

1. Immediately audit and restrict Suricata package permissions to only trusted administrators to minimize the number of users who can exploit this vulnerability. 2. Implement strong authentication mechanisms, including multi-factor authentication (MFA), for accessing the pfSense web interface to reduce the risk of credential compromise. 3. Network segmentation should be employed to isolate management interfaces of pfSense devices from general user networks and the internet, limiting attacker access. 4. Monitor logs and user activity for unusual access patterns or attempts to manipulate the 'iplist' parameter or other Suricata settings. 5. Apply strict input validation and sanitization on all web interface parameters, especially those interacting with the filesystem, as a development best practice. 6. Stay informed about official patches or updates from Netgate and apply them promptly once released. 7. Consider deploying Web Application Firewalls (WAFs) or Intrusion Detection Systems (IDS) to detect and block directory traversal attempts targeting the Suricata web interface. 8. Regularly review and update firewall and access control policies to ensure minimal exposure of management interfaces.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulnCheck
Date Reserved
2025-04-15T19:15:22.567Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68c08cadbf8644e23a9d2217

Added to database: 9/9/2025, 8:23:09 PM

Last enriched: 11/27/2025, 12:55:09 PM

Last updated: 12/13/2025, 5:16:38 PM

Views: 126

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats