Skip to main content

CVE-2025-48017: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Schweitzer Engineering Laboratories SEL-5056 Software-Defined Network Flow Controller

Critical
VulnerabilityCVE-2025-48017cvecve-2025-48017cwe-22
Published: Tue May 20 2025 (05/20/2025, 15:14:02 UTC)
Source: CVE
Vendor/Project: Schweitzer Engineering Laboratories
Product: SEL-5056 Software-Defined Network Flow Controller

Description

Improper limitation of pathname in Circuit Provisioning and File Import applications allows modification and uploading of files

AI-Powered Analysis

AILast updated: 07/11/2025, 13:17:34 UTC

Technical Analysis

CVE-2025-48017 is a critical security vulnerability classified under CWE-22, which pertains to improper limitation of a pathname to a restricted directory, commonly known as a path traversal vulnerability. This vulnerability affects the SEL-5056 Software-Defined Network Flow Controller developed by Schweitzer Engineering Laboratories (SEL). The flaw exists within the Circuit Provisioning and File Import applications of the product, where insufficient validation of file pathnames allows an attacker to manipulate file paths. This manipulation can enable unauthorized modification and uploading of files outside the intended directories. The vulnerability is remotely exploitable without requiring authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H). The attack complexity is high, but the impact on confidentiality, integrity, and availability is critical, with the potential for complete system compromise. The scope is changed (S:C), meaning the vulnerability can affect resources beyond the initially vulnerable component. Although no known exploits are currently reported in the wild, the severity and nature of the vulnerability make it a significant risk. The SEL-5056 controller is used in network flow management, likely within critical infrastructure and industrial control environments, where unauthorized file modifications could disrupt network operations or enable further attacks.

Potential Impact

For European organizations, especially those operating critical infrastructure, utilities, or industrial control systems, this vulnerability poses a severe risk. Exploitation could lead to unauthorized access to sensitive configuration files or the insertion of malicious files, potentially disrupting network flow control and monitoring. This could result in degraded network performance, denial of service, or facilitate lateral movement by attackers within the network. Given the critical nature of the SEL-5056 in managing network flows, any compromise could impact operational continuity and safety. Additionally, the breach of confidentiality and integrity of network data could lead to regulatory non-compliance under frameworks such as GDPR and NIS Directive, resulting in legal and financial repercussions. The high severity and remote exploitability without authentication increase the urgency for European organizations to address this vulnerability promptly.

Mitigation Recommendations

Organizations should immediately assess their deployment of the SEL-5056 Software-Defined Network Flow Controller and prioritize patching once vendor updates become available. In the absence of patches, implement strict network segmentation to isolate the affected devices from untrusted networks and limit access to management interfaces to trusted personnel only. Employ application-layer firewalls or intrusion prevention systems (IPS) with custom rules to detect and block suspicious file path manipulations targeting the Circuit Provisioning and File Import functionalities. Conduct thorough audits of file system permissions on the devices to ensure that only necessary directories are writable and that privilege escalation paths are minimized. Additionally, monitor logs for unusual file upload activities or unauthorized configuration changes. Engage with Schweitzer Engineering Laboratories for timely updates and consider deploying compensating controls such as enhanced authentication mechanisms and multi-factor authentication for administrative access to reduce risk exposure.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
SEL
Date Reserved
2025-05-15T00:31:11.898Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f71484d88663aeaefd

Added to database: 5/20/2025, 6:59:03 PM

Last enriched: 7/11/2025, 1:17:34 PM

Last updated: 8/12/2025, 11:06:23 AM

Views: 26

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats