CVE-2025-48395: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Eaton NMC G2
An attacker with authenticated and privileged access could modify the contents of a non-sensitive file by traversing the path in the limited shell of the CLI. This security issue has been fixed in the latest version of NMC G2 which is available on the Eaton download center.
AI Analysis
Technical Summary
CVE-2025-48395 is a medium-severity vulnerability classified under CWE-22, which pertains to improper limitation of a pathname to a restricted directory, commonly known as a path traversal vulnerability. This issue affects Eaton's NMC G2 product, a network management controller used for power management and infrastructure control. The vulnerability allows an attacker who already has authenticated and privileged access to the device's CLI (Command Line Interface) limited shell to perform path traversal attacks. By exploiting this flaw, the attacker can modify the contents of non-sensitive files outside the intended restricted directory. Although the files affected are non-sensitive, unauthorized modification can still impact system integrity and availability. The vulnerability does not require user interaction but does require high-level privileges, indicating that the attacker must have already gained significant access to the system. The CVSS v3.1 base score is 4.7, reflecting a medium severity with network attack vector, low attack complexity, and no user interaction needed. Eaton has addressed this vulnerability in the latest version of NMC G2, which is available for download from their official center. No known exploits are currently reported in the wild, but the presence of this vulnerability in critical infrastructure management devices underscores the importance of timely patching.
Potential Impact
For European organizations, the impact of CVE-2025-48395 can be significant, especially for those relying on Eaton NMC G2 devices to manage critical power infrastructure such as data centers, industrial facilities, and utilities. Although the vulnerability affects non-sensitive files, unauthorized modification can lead to system misconfigurations, degraded device performance, or denial of service conditions, potentially disrupting power management operations. This can affect operational continuity and may indirectly impact confidentiality and integrity if attackers leverage this foothold for further lateral movement or privilege escalation. Given the reliance on such devices in sectors like manufacturing, energy, and telecommunications across Europe, exploitation could lead to operational disruptions and financial losses. The requirement for authenticated privileged access limits the risk to insider threats or attackers who have already compromised administrative credentials, but it still represents a serious risk in environments where credential hygiene is weak or where attackers have gained initial access through other means.
Mitigation Recommendations
European organizations using Eaton NMC G2 should immediately verify their device versions and upgrade to the latest patched firmware available from Eaton's official download center. Beyond patching, organizations should enforce strict access controls and multi-factor authentication for administrative interfaces to reduce the risk of credential compromise. Network segmentation should be employed to isolate management interfaces from general network access, limiting exposure to potential attackers. Regular auditing of user accounts and privileges on NMC G2 devices is essential to detect and remove unnecessary privileged accounts. Implementing monitoring and alerting for unusual file modifications or CLI commands can help detect exploitation attempts early. Additionally, organizations should conduct periodic security assessments and penetration testing focused on management infrastructure to identify and remediate similar vulnerabilities proactively.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden, Belgium, Finland
CVE-2025-48395: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Eaton NMC G2
Description
An attacker with authenticated and privileged access could modify the contents of a non-sensitive file by traversing the path in the limited shell of the CLI. This security issue has been fixed in the latest version of NMC G2 which is available on the Eaton download center.
AI-Powered Analysis
Technical Analysis
CVE-2025-48395 is a medium-severity vulnerability classified under CWE-22, which pertains to improper limitation of a pathname to a restricted directory, commonly known as a path traversal vulnerability. This issue affects Eaton's NMC G2 product, a network management controller used for power management and infrastructure control. The vulnerability allows an attacker who already has authenticated and privileged access to the device's CLI (Command Line Interface) limited shell to perform path traversal attacks. By exploiting this flaw, the attacker can modify the contents of non-sensitive files outside the intended restricted directory. Although the files affected are non-sensitive, unauthorized modification can still impact system integrity and availability. The vulnerability does not require user interaction but does require high-level privileges, indicating that the attacker must have already gained significant access to the system. The CVSS v3.1 base score is 4.7, reflecting a medium severity with network attack vector, low attack complexity, and no user interaction needed. Eaton has addressed this vulnerability in the latest version of NMC G2, which is available for download from their official center. No known exploits are currently reported in the wild, but the presence of this vulnerability in critical infrastructure management devices underscores the importance of timely patching.
Potential Impact
For European organizations, the impact of CVE-2025-48395 can be significant, especially for those relying on Eaton NMC G2 devices to manage critical power infrastructure such as data centers, industrial facilities, and utilities. Although the vulnerability affects non-sensitive files, unauthorized modification can lead to system misconfigurations, degraded device performance, or denial of service conditions, potentially disrupting power management operations. This can affect operational continuity and may indirectly impact confidentiality and integrity if attackers leverage this foothold for further lateral movement or privilege escalation. Given the reliance on such devices in sectors like manufacturing, energy, and telecommunications across Europe, exploitation could lead to operational disruptions and financial losses. The requirement for authenticated privileged access limits the risk to insider threats or attackers who have already compromised administrative credentials, but it still represents a serious risk in environments where credential hygiene is weak or where attackers have gained initial access through other means.
Mitigation Recommendations
European organizations using Eaton NMC G2 should immediately verify their device versions and upgrade to the latest patched firmware available from Eaton's official download center. Beyond patching, organizations should enforce strict access controls and multi-factor authentication for administrative interfaces to reduce the risk of credential compromise. Network segmentation should be employed to isolate management interfaces from general network access, limiting exposure to potential attackers. Regular auditing of user accounts and privileges on NMC G2 devices is essential to detect and remove unnecessary privileged accounts. Implementing monitoring and alerting for unusual file modifications or CLI commands can help detect exploitation attempts early. Additionally, organizations should conduct periodic security assessments and penetration testing focused on management infrastructure to identify and remediate similar vulnerabilities proactively.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Eaton
- Date Reserved
- 2025-05-20T04:07:25.100Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68bae6eb9bc4cbad54150dc6
Added to database: 9/5/2025, 1:34:35 PM
Last enriched: 9/5/2025, 1:35:18 PM
Last updated: 9/5/2025, 1:35:18 PM
Views: 2
Related Threats
CVE-2025-35451: CWE-798 Use of Hard-coded Credentials in PTZOptics PT12X-SE-xx-G3
CriticalCVE-2025-30200: CWE-321 Use of Hard-coded Cryptographic Key in ECOVACS DEEBOT X1 Series
MediumCVE-2025-30199: CWE-494 Download of Code Without Integrity Check in ECOVACS DEEBOT X1 Series
HighCVE-2025-30198: CWE-321 Use of Hard-coded Cryptographic Key in ECOVACS DEEBOT X1 Series
MediumCVE-2025-10014: Improper Authorization in elunez eladmin
LowActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.