Skip to main content

CVE-2025-49153: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Microsens NMP Web+

Critical
VulnerabilityCVE-2025-49153cvecve-2025-49153cwe-22
Published: Wed Jun 25 2025 (06/25/2025, 16:36:11 UTC)
Source: CVE Database V5
Vendor/Project: Microsens
Product: NMP Web+

Description

The affected products could allow an unauthenticated attacker to overwrite files and execute arbitrary code.

AI-Powered Analysis

AILast updated: 07/17/2025, 20:35:56 UTC

Technical Analysis

CVE-2025-49153 is a critical security vulnerability classified under CWE-22, which pertains to improper limitation of a pathname to a restricted directory, commonly known as a path traversal vulnerability. This flaw affects Microsens NMP Web+, a network management product. The vulnerability allows an unauthenticated attacker to exploit the path traversal weakness to overwrite arbitrary files on the affected system. By manipulating file paths, the attacker can escape the intended directory restrictions and write malicious files to sensitive locations. This capability can lead to arbitrary code execution, enabling the attacker to run code with the privileges of the vulnerable application or potentially escalate privileges further. The vulnerability is notable for requiring no authentication, no user interaction, and having a low attack complexity, making it highly exploitable remotely over the network. The CVSS 3.1 base score of 9.3 reflects the critical nature of this vulnerability, with high impacts on confidentiality, integrity, and availability. Although no known exploits are currently reported in the wild, the severity and ease of exploitation make it a significant threat. The affected version is indicated as "0", which likely means all current versions or an unspecified version set are vulnerable until patched. No official patches have been linked yet, emphasizing the need for immediate attention from users of Microsens NMP Web+. The vulnerability's exploitation could lead to full system compromise, data breaches, and disruption of network management operations.

Potential Impact

For European organizations, the impact of CVE-2025-49153 could be severe, especially for those relying on Microsens NMP Web+ for network management and monitoring. Successful exploitation could result in unauthorized access to critical infrastructure, manipulation or destruction of configuration files, and deployment of malicious payloads within enterprise networks. This could lead to operational downtime, data loss, and compromise of network integrity. Given that network management systems often have elevated privileges and broad access, attackers could pivot to other internal systems, amplifying the damage. Industries such as telecommunications, energy, manufacturing, and government agencies in Europe that use Microsens products could face significant operational and reputational risks. Additionally, the lack of authentication requirement and remote exploitability increase the likelihood of automated attacks and worm-like propagation within vulnerable networks, potentially affecting multiple organizations simultaneously.

Mitigation Recommendations

1. Immediate mitigation should include isolating the Microsens NMP Web+ system from untrusted networks to reduce exposure. 2. Monitor network traffic for unusual file write operations or unexpected requests targeting the web interface. 3. Implement strict network segmentation and access controls to limit the ability of attackers to reach the vulnerable system. 4. Employ Web Application Firewalls (WAFs) with custom rules to detect and block path traversal attempts targeting the product. 5. Regularly audit and review file system permissions on the NMP Web+ host to minimize the impact of potential file overwrites. 6. Engage with Microsens support or security advisories for forthcoming patches or official remediation guidance. 7. Prepare incident response plans specifically addressing potential exploitation scenarios of this vulnerability. 8. Consider deploying intrusion detection/prevention systems (IDS/IPS) signatures tuned to detect exploitation attempts of CWE-22 path traversal vulnerabilities. 9. If feasible, temporarily disable or restrict access to vulnerable features or services within NMP Web+ until patches are available.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
icscert
Date Reserved
2025-06-02T17:06:38.139Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 685c27e95eba5e446992c413

Added to database: 6/25/2025, 4:46:33 PM

Last enriched: 7/17/2025, 8:35:56 PM

Last updated: 8/12/2025, 11:44:32 PM

Views: 54

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats