Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-49153: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Microsens NMP Web+

0
Critical
VulnerabilityCVE-2025-49153cvecve-2025-49153cwe-22
Published: Wed Jun 25 2025 (06/25/2025, 16:36:11 UTC)
Source: CVE Database V5
Vendor/Project: Microsens
Product: NMP Web+

Description

The affected products could allow an unauthenticated attacker to overwrite files and execute arbitrary code.

AI-Powered Analysis

AILast updated: 07/17/2025, 20:35:56 UTC

Technical Analysis

CVE-2025-49153 is a critical security vulnerability classified under CWE-22, which pertains to improper limitation of a pathname to a restricted directory, commonly known as a path traversal vulnerability. This flaw affects Microsens NMP Web+, a network management product. The vulnerability allows an unauthenticated attacker to exploit the path traversal weakness to overwrite arbitrary files on the affected system. By manipulating file paths, the attacker can escape the intended directory restrictions and write malicious files to sensitive locations. This capability can lead to arbitrary code execution, enabling the attacker to run code with the privileges of the vulnerable application or potentially escalate privileges further. The vulnerability is notable for requiring no authentication, no user interaction, and having a low attack complexity, making it highly exploitable remotely over the network. The CVSS 3.1 base score of 9.3 reflects the critical nature of this vulnerability, with high impacts on confidentiality, integrity, and availability. Although no known exploits are currently reported in the wild, the severity and ease of exploitation make it a significant threat. The affected version is indicated as "0", which likely means all current versions or an unspecified version set are vulnerable until patched. No official patches have been linked yet, emphasizing the need for immediate attention from users of Microsens NMP Web+. The vulnerability's exploitation could lead to full system compromise, data breaches, and disruption of network management operations.

Potential Impact

For European organizations, the impact of CVE-2025-49153 could be severe, especially for those relying on Microsens NMP Web+ for network management and monitoring. Successful exploitation could result in unauthorized access to critical infrastructure, manipulation or destruction of configuration files, and deployment of malicious payloads within enterprise networks. This could lead to operational downtime, data loss, and compromise of network integrity. Given that network management systems often have elevated privileges and broad access, attackers could pivot to other internal systems, amplifying the damage. Industries such as telecommunications, energy, manufacturing, and government agencies in Europe that use Microsens products could face significant operational and reputational risks. Additionally, the lack of authentication requirement and remote exploitability increase the likelihood of automated attacks and worm-like propagation within vulnerable networks, potentially affecting multiple organizations simultaneously.

Mitigation Recommendations

1. Immediate mitigation should include isolating the Microsens NMP Web+ system from untrusted networks to reduce exposure. 2. Monitor network traffic for unusual file write operations or unexpected requests targeting the web interface. 3. Implement strict network segmentation and access controls to limit the ability of attackers to reach the vulnerable system. 4. Employ Web Application Firewalls (WAFs) with custom rules to detect and block path traversal attempts targeting the product. 5. Regularly audit and review file system permissions on the NMP Web+ host to minimize the impact of potential file overwrites. 6. Engage with Microsens support or security advisories for forthcoming patches or official remediation guidance. 7. Prepare incident response plans specifically addressing potential exploitation scenarios of this vulnerability. 8. Consider deploying intrusion detection/prevention systems (IDS/IPS) signatures tuned to detect exploitation attempts of CWE-22 path traversal vulnerabilities. 9. If feasible, temporarily disable or restrict access to vulnerable features or services within NMP Web+ until patches are available.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
icscert
Date Reserved
2025-06-02T17:06:38.139Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 685c27e95eba5e446992c413

Added to database: 6/25/2025, 4:46:33 PM

Last enriched: 7/17/2025, 8:35:56 PM

Last updated: 1/7/2026, 8:51:21 AM

Views: 107

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats