CVE-2025-54963: n/a
An issue was discovered in BAE SOCET GXP before 4.6.0.2. An attacker with the ability to interact with the GXP Job Service may submit a crafted job request that grants read access to files on the filesystem with the permissions of the GXP Job Service process. The path to a file is not sanitized for directory traversal, potentially allowing an attacker to read sensitive files in some configurations.
AI Analysis
Technical Summary
CVE-2025-54963 is a directory traversal vulnerability identified in BAE Systems' SOCET GXP software prior to version 4.6.0.2. SOCET GXP is a geospatial analysis and imagery exploitation tool widely used in defense, intelligence, and mapping sectors. The vulnerability arises from insufficient sanitization of file paths submitted via the GXP Job Service interface. An attacker who can interact with this service—requiring at least limited privileges—can craft job requests that include directory traversal sequences (e.g., ../) to access arbitrary files on the host filesystem. Because the Job Service executes these requests with its own permissions, the attacker can read sensitive files that the service account can access, potentially including configuration files, credentials, or other sensitive data. The vulnerability is categorized under CWE-22 (Improper Limitation of a Pathname to a Restricted Directory). The CVSS v3.1 base score is 6.5, reflecting a network attack vector with low attack complexity, requiring privileges but no user interaction, and resulting in high confidentiality impact without affecting integrity or availability. No public exploits have been reported yet, but the vulnerability poses a significant risk to confidentiality in environments where SOCET GXP is deployed. The lack of path sanitization indicates a design flaw that can be exploited remotely by authenticated users, emphasizing the need for strict access controls and timely patching.
Potential Impact
For European organizations, particularly those in defense, intelligence, and geospatial analysis sectors that rely on SOCET GXP, this vulnerability could lead to unauthorized disclosure of sensitive information. Exposure of configuration files, credentials, or classified data could compromise operational security and intelligence activities. Since SOCET GXP is used in critical infrastructure mapping and military planning, the confidentiality breach could have strategic consequences. The vulnerability does not allow modification or disruption of services, so integrity and availability impacts are minimal. However, the ability to read arbitrary files remotely increases the risk of further attacks, such as credential theft or reconnaissance for lateral movement. Organizations handling classified or sensitive geospatial data must consider the potential for espionage or data leaks. The medium severity rating suggests a moderate but actionable risk that should be addressed promptly to prevent exploitation.
Mitigation Recommendations
1. Upgrade SOCET GXP to version 4.6.0.2 or later where the vulnerability is fixed. 2. Restrict access to the GXP Job Service interface to trusted and authenticated users only, employing network segmentation and firewall rules to limit exposure. 3. Implement strict role-based access controls (RBAC) to minimize the number of users who can submit job requests. 4. Monitor and log all interactions with the Job Service for anomalous or suspicious activity indicative of directory traversal attempts. 5. Conduct regular audits of file permissions for the Job Service process to ensure it operates with the least privilege necessary. 6. If patching is delayed, consider deploying application-layer filtering or web application firewalls (WAFs) that can detect and block directory traversal patterns in job requests. 7. Educate administrators and users about the risks of submitting untrusted input to the Job Service and enforce secure coding and configuration practices in custom integrations.
Affected Countries
United Kingdom, France, Germany, Italy, Spain, Netherlands, Belgium, Sweden, Poland, Norway
CVE-2025-54963: n/a
Description
An issue was discovered in BAE SOCET GXP before 4.6.0.2. An attacker with the ability to interact with the GXP Job Service may submit a crafted job request that grants read access to files on the filesystem with the permissions of the GXP Job Service process. The path to a file is not sanitized for directory traversal, potentially allowing an attacker to read sensitive files in some configurations.
AI-Powered Analysis
Technical Analysis
CVE-2025-54963 is a directory traversal vulnerability identified in BAE Systems' SOCET GXP software prior to version 4.6.0.2. SOCET GXP is a geospatial analysis and imagery exploitation tool widely used in defense, intelligence, and mapping sectors. The vulnerability arises from insufficient sanitization of file paths submitted via the GXP Job Service interface. An attacker who can interact with this service—requiring at least limited privileges—can craft job requests that include directory traversal sequences (e.g., ../) to access arbitrary files on the host filesystem. Because the Job Service executes these requests with its own permissions, the attacker can read sensitive files that the service account can access, potentially including configuration files, credentials, or other sensitive data. The vulnerability is categorized under CWE-22 (Improper Limitation of a Pathname to a Restricted Directory). The CVSS v3.1 base score is 6.5, reflecting a network attack vector with low attack complexity, requiring privileges but no user interaction, and resulting in high confidentiality impact without affecting integrity or availability. No public exploits have been reported yet, but the vulnerability poses a significant risk to confidentiality in environments where SOCET GXP is deployed. The lack of path sanitization indicates a design flaw that can be exploited remotely by authenticated users, emphasizing the need for strict access controls and timely patching.
Potential Impact
For European organizations, particularly those in defense, intelligence, and geospatial analysis sectors that rely on SOCET GXP, this vulnerability could lead to unauthorized disclosure of sensitive information. Exposure of configuration files, credentials, or classified data could compromise operational security and intelligence activities. Since SOCET GXP is used in critical infrastructure mapping and military planning, the confidentiality breach could have strategic consequences. The vulnerability does not allow modification or disruption of services, so integrity and availability impacts are minimal. However, the ability to read arbitrary files remotely increases the risk of further attacks, such as credential theft or reconnaissance for lateral movement. Organizations handling classified or sensitive geospatial data must consider the potential for espionage or data leaks. The medium severity rating suggests a moderate but actionable risk that should be addressed promptly to prevent exploitation.
Mitigation Recommendations
1. Upgrade SOCET GXP to version 4.6.0.2 or later where the vulnerability is fixed. 2. Restrict access to the GXP Job Service interface to trusted and authenticated users only, employing network segmentation and firewall rules to limit exposure. 3. Implement strict role-based access controls (RBAC) to minimize the number of users who can submit job requests. 4. Monitor and log all interactions with the Job Service for anomalous or suspicious activity indicative of directory traversal attempts. 5. Conduct regular audits of file permissions for the Job Service process to ensure it operates with the least privilege necessary. 6. If patching is delayed, consider deploying application-layer filtering or web application firewalls (WAFs) that can detect and block directory traversal patterns in job requests. 7. Educate administrators and users about the risks of submitting untrusted input to the Job Service and enforce secure coding and configuration practices in custom integrations.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2025-08-04T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 68fa8e34326f59cb11ee323c
Added to database: 10/23/2025, 8:21:08 PM
Last enriched: 10/31/2025, 6:52:19 AM
Last updated: 12/7/2025, 3:36:09 AM
Views: 164
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14182: Path Traversal in Sobey Media Convergence System
MediumCVE-2025-14141: Buffer Overflow in UTT 进取 520W
HighCVE-2025-14140: Buffer Overflow in UTT 进取 520W
HighCVE-2025-14139: Buffer Overflow in UTT 进取 520W
MediumCVE-2025-14136: Stack-based Buffer Overflow in Linksys RE6500
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.