CVE-2025-48017: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Schweitzer Engineering Laboratories SEL-5056 Software-Defined Network Flow Controller
Improper limitation of pathname in Circuit Provisioning and File Import applications allows modification and uploading of files
AI Analysis
Technical Summary
CVE-2025-48017 is a critical security vulnerability classified under CWE-22, which pertains to improper limitation of a pathname to a restricted directory, commonly known as a path traversal vulnerability. This vulnerability affects the SEL-5056 Software-Defined Network Flow Controller developed by Schweitzer Engineering Laboratories (SEL). The flaw exists within the Circuit Provisioning and File Import applications of the product, where insufficient validation of file pathnames allows an attacker to manipulate file paths. This manipulation can enable unauthorized modification and uploading of files outside the intended directories. The vulnerability is remotely exploitable without requiring authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H). The attack complexity is high, but the impact on confidentiality, integrity, and availability is critical, with the potential for complete system compromise. The scope is changed (S:C), meaning the vulnerability can affect resources beyond the initially vulnerable component. Although no known exploits are currently reported in the wild, the severity and nature of the vulnerability make it a significant risk. The SEL-5056 controller is used in network flow management, likely within critical infrastructure and industrial control environments, where unauthorized file modifications could disrupt network operations or enable further attacks.
Potential Impact
For European organizations, especially those operating critical infrastructure, utilities, or industrial control systems, this vulnerability poses a severe risk. Exploitation could lead to unauthorized access to sensitive configuration files or the insertion of malicious files, potentially disrupting network flow control and monitoring. This could result in degraded network performance, denial of service, or facilitate lateral movement by attackers within the network. Given the critical nature of the SEL-5056 in managing network flows, any compromise could impact operational continuity and safety. Additionally, the breach of confidentiality and integrity of network data could lead to regulatory non-compliance under frameworks such as GDPR and NIS Directive, resulting in legal and financial repercussions. The high severity and remote exploitability without authentication increase the urgency for European organizations to address this vulnerability promptly.
Mitigation Recommendations
Organizations should immediately assess their deployment of the SEL-5056 Software-Defined Network Flow Controller and prioritize patching once vendor updates become available. In the absence of patches, implement strict network segmentation to isolate the affected devices from untrusted networks and limit access to management interfaces to trusted personnel only. Employ application-layer firewalls or intrusion prevention systems (IPS) with custom rules to detect and block suspicious file path manipulations targeting the Circuit Provisioning and File Import functionalities. Conduct thorough audits of file system permissions on the devices to ensure that only necessary directories are writable and that privilege escalation paths are minimized. Additionally, monitor logs for unusual file upload activities or unauthorized configuration changes. Engage with Schweitzer Engineering Laboratories for timely updates and consider deploying compensating controls such as enhanced authentication mechanisms and multi-factor authentication for administrative access to reduce risk exposure.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden, Poland, Czech Republic
CVE-2025-48017: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Schweitzer Engineering Laboratories SEL-5056 Software-Defined Network Flow Controller
Description
Improper limitation of pathname in Circuit Provisioning and File Import applications allows modification and uploading of files
AI-Powered Analysis
Technical Analysis
CVE-2025-48017 is a critical security vulnerability classified under CWE-22, which pertains to improper limitation of a pathname to a restricted directory, commonly known as a path traversal vulnerability. This vulnerability affects the SEL-5056 Software-Defined Network Flow Controller developed by Schweitzer Engineering Laboratories (SEL). The flaw exists within the Circuit Provisioning and File Import applications of the product, where insufficient validation of file pathnames allows an attacker to manipulate file paths. This manipulation can enable unauthorized modification and uploading of files outside the intended directories. The vulnerability is remotely exploitable without requiring authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H). The attack complexity is high, but the impact on confidentiality, integrity, and availability is critical, with the potential for complete system compromise. The scope is changed (S:C), meaning the vulnerability can affect resources beyond the initially vulnerable component. Although no known exploits are currently reported in the wild, the severity and nature of the vulnerability make it a significant risk. The SEL-5056 controller is used in network flow management, likely within critical infrastructure and industrial control environments, where unauthorized file modifications could disrupt network operations or enable further attacks.
Potential Impact
For European organizations, especially those operating critical infrastructure, utilities, or industrial control systems, this vulnerability poses a severe risk. Exploitation could lead to unauthorized access to sensitive configuration files or the insertion of malicious files, potentially disrupting network flow control and monitoring. This could result in degraded network performance, denial of service, or facilitate lateral movement by attackers within the network. Given the critical nature of the SEL-5056 in managing network flows, any compromise could impact operational continuity and safety. Additionally, the breach of confidentiality and integrity of network data could lead to regulatory non-compliance under frameworks such as GDPR and NIS Directive, resulting in legal and financial repercussions. The high severity and remote exploitability without authentication increase the urgency for European organizations to address this vulnerability promptly.
Mitigation Recommendations
Organizations should immediately assess their deployment of the SEL-5056 Software-Defined Network Flow Controller and prioritize patching once vendor updates become available. In the absence of patches, implement strict network segmentation to isolate the affected devices from untrusted networks and limit access to management interfaces to trusted personnel only. Employ application-layer firewalls or intrusion prevention systems (IPS) with custom rules to detect and block suspicious file path manipulations targeting the Circuit Provisioning and File Import functionalities. Conduct thorough audits of file system permissions on the devices to ensure that only necessary directories are writable and that privilege escalation paths are minimized. Additionally, monitor logs for unusual file upload activities or unauthorized configuration changes. Engage with Schweitzer Engineering Laboratories for timely updates and consider deploying compensating controls such as enhanced authentication mechanisms and multi-factor authentication for administrative access to reduce risk exposure.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- SEL
- Date Reserved
- 2025-05-15T00:31:11.898Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682cd0f71484d88663aeaefd
Added to database: 5/20/2025, 6:59:03 PM
Last enriched: 7/11/2025, 1:17:34 PM
Last updated: 8/12/2025, 11:06:23 AM
Views: 26
Related Threats
CVE-2025-9091: Hard-coded Credentials in Tenda AC20
LowCVE-2025-9090: Command Injection in Tenda AC20
MediumCVE-2025-9092: CWE-400 Uncontrolled Resource Consumption in Legion of the Bouncy Castle Inc. Bouncy Castle for Java - BC-FJA 2.1.0
LowCVE-2025-9089: Stack-based Buffer Overflow in Tenda AC20
HighCVE-2025-9088: Stack-based Buffer Overflow in Tenda AC20
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.