Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-34179: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in NetSupport Software Manager

0
High
VulnerabilityCVE-2025-34179cvecve-2025-34179cwe-89
Published: Mon Dec 15 2025 (12/15/2025, 14:41:27 UTC)
Source: CVE Database V5
Vendor/Project: NetSupport Software
Product: Manager

Description

NetSupport Manager < 14.12.0001 contains an unauthenticated SQL injection vulnerability in its Connectivity Server/Gateway HTTPS request handling. The server evaluates request URIs using an unsanitized SQLite query against the FileLinks table in gateway.db. By injecting SQL through the LinkName/URI value, a remote attacker can control the FileName field used by the server to read and return files from disk, resulting in arbitrary local file disclosure.

AI-Powered Analysis

AILast updated: 12/22/2025, 15:52:32 UTC

Technical Analysis

CVE-2025-34179 is an SQL injection vulnerability categorized under CWE-89, found in NetSupport Manager versions before 14.12.0001. The flaw resides in the Connectivity Server/Gateway HTTPS request handling mechanism, where incoming request URIs are parsed and used directly in SQLite queries without proper sanitization or parameterization. Specifically, the server queries the FileLinks table in the gateway.db database using the LinkName or URI value from the request. Because the input is unsanitized, an attacker can craft malicious SQL payloads that alter the query logic, enabling them to control the FileName field. This manipulation allows the attacker to trick the server into reading arbitrary files from the local filesystem and returning their contents in the response, effectively disclosing sensitive local files. The vulnerability requires no authentication or user interaction, making it remotely exploitable over the network. The CVSS 4.0 vector (AV:N/AC:L/AT:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N) reflects network attack vector, low complexity, no privileges or user interaction needed, and high confidentiality impact. Although no public exploits are known at this time, the vulnerability's nature and ease of exploitation pose a serious threat. The absence of patches at the time of reporting necessitates immediate attention from affected organizations. This vulnerability could be leveraged to access configuration files, credentials, or other sensitive data stored on the server, potentially facilitating further attacks or data breaches.

Potential Impact

For European organizations, the impact of CVE-2025-34179 is significant due to the potential for unauthorized disclosure of sensitive local files on servers running vulnerable NetSupport Manager versions. This can lead to exposure of confidential information such as credentials, internal configurations, or personal data, which may violate GDPR and other data protection regulations. The unauthenticated nature of the exploit means attackers can remotely access these files without needing valid credentials, increasing the risk of widespread compromise. Organizations relying on NetSupport Manager for remote desktop management, IT support, or system administration could face operational disruptions if attackers leverage disclosed information to escalate privileges or deploy further attacks. The confidentiality breach could also damage organizational reputation and lead to regulatory penalties. Given the high CVSS score and ease of exploitation, the threat is particularly acute for sectors with critical infrastructure or sensitive data, such as finance, healthcare, and government entities across Europe.

Mitigation Recommendations

1. Immediate upgrade to NetSupport Manager version 14.12.0001 or later once available, as this version addresses the vulnerability. 2. Until patches are released, restrict external network access to the Connectivity Server/Gateway component by implementing strict firewall rules and network segmentation to limit exposure. 3. Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious SQL injection patterns targeting the LinkName/URI parameters. 4. Conduct thorough logging and monitoring of all incoming HTTPS requests to the gateway, focusing on unusual or malformed URI requests that could indicate exploitation attempts. 5. Review and harden database access permissions to minimize the impact of any successful injection, ensuring the SQLite database operates with least privilege. 6. Regularly audit and scan NetSupport Manager deployments using automated vulnerability scanners to detect vulnerable versions. 7. Educate IT and security teams about this specific vulnerability to improve incident detection and response readiness. 8. Consider temporary disabling or isolating the vulnerable Connectivity Server/Gateway service if feasible until a patch is applied.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2025-04-15T19:15:22.567Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6940227fd9bcdf3f3de2752b

Added to database: 12/15/2025, 3:00:15 PM

Last enriched: 12/22/2025, 3:52:32 PM

Last updated: 2/5/2026, 3:11:37 PM

Views: 76

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats