Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-34176: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Netgate pfSense CE

0
Medium
VulnerabilityCVE-2025-34176cvecve-2025-34176cwe-22
Published: Tue Sep 09 2025 (09/09/2025, 20:14:37 UTC)
Source: CVE Database V5
Vendor/Project: Netgate
Product: pfSense CE

Description

In pfSense CE /suricata/suricata_ip_reputation.php, the value of the iplist parameter is not sanitized of directory traversal-related strings/characters. This value is directly used in a file existence check operation. While the contents of the file cannot be read, the server reveals whether the file exists, which enables an attacker to enumerate files on the target. The attacker must be authenticated with at least "WebCfg - Services: suricata package" permissions.

AI-Powered Analysis

AILast updated: 09/17/2025, 01:10:50 UTC

Technical Analysis

CVE-2025-34176 is a medium-severity path traversal vulnerability identified in the pfSense CE product by Netgate, specifically affecting version 7.0.8_2. The vulnerability exists in the /suricata/suricata_ip_reputation.php script, where the 'iplist' parameter is not properly sanitized against directory traversal characters or strings. This improper input validation allows an authenticated attacker—who has at least 'WebCfg - Services: suricata package' permissions—to manipulate the 'iplist' parameter to perform directory traversal attacks. Although the attacker cannot read the contents of arbitrary files, the vulnerability allows them to check for the existence of files on the server by exploiting the file existence check operation that uses the unsanitized input. This file existence enumeration can reveal sensitive information about the server's file system structure, potentially aiding further attacks or reconnaissance. The vulnerability does not require user interaction beyond authentication and has a CVSS 4.0 base score of 5.3, reflecting a medium severity level. No known exploits are currently reported in the wild, and no patches have been linked yet, indicating that mitigation may require manual intervention or monitoring for future updates from Netgate. The vulnerability is classified under CWE-22, which concerns improper limitation of a pathname to a restricted directory, commonly known as path traversal.

Potential Impact

For European organizations using pfSense CE version 7.0.8_2 with the Suricata package enabled, this vulnerability poses a moderate risk. The ability to enumerate files on the firewall or security appliance can disclose information about the system's configuration, installed software, or sensitive files, which could be leveraged by attackers for further targeted attacks or privilege escalation. Since the attacker must be authenticated with specific permissions, the risk is somewhat mitigated by access controls; however, insider threats or compromised credentials could still lead to exploitation. The impact on confidentiality is moderate due to information disclosure, while integrity and availability are not directly affected. Organizations relying on pfSense CE for perimeter security or network segmentation may find their defenses weakened if attackers gain detailed knowledge of system files. This could be particularly concerning for critical infrastructure providers, financial institutions, or government agencies in Europe that use pfSense CE as part of their security infrastructure.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should: 1) Immediately review and restrict access to the Suricata package configuration interface, ensuring only trusted administrators have 'WebCfg - Services: suricata package' permissions. 2) Monitor authentication logs for suspicious access patterns or unauthorized attempts to access the Suricata configuration. 3) Implement network segmentation and multi-factor authentication (MFA) for administrative access to pfSense CE devices to reduce the risk of credential compromise. 4) Regularly audit pfSense CE installations to verify the version and apply any available patches or updates from Netgate as soon as they are released. 5) Consider deploying Web Application Firewalls (WAFs) or Intrusion Detection/Prevention Systems (IDS/IPS) that can detect and block directory traversal attempts targeting the Suricata interface. 6) If feasible, temporarily disable or limit the Suricata package's web configuration interface until a patch is available. 7) Educate administrators about the risks of path traversal vulnerabilities and the importance of secure credential management.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulnCheck
Date Reserved
2025-04-15T19:15:22.567Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68c08cadbf8644e23a9d2217

Added to database: 9/9/2025, 8:23:09 PM

Last enriched: 9/17/2025, 1:10:50 AM

Last updated: 10/30/2025, 1:56:57 PM

Views: 88

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats