Skip to main content

CVE-2025-6796: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Marvell QConvergeConsole

High
VulnerabilityCVE-2025-6796cvecve-2025-6796cwe-22
Published: Mon Jul 07 2025 (07/07/2025, 14:50:33 UTC)
Source: CVE Database V5
Vendor/Project: Marvell
Product: QConvergeConsole

Description

Marvell QConvergeConsole getAppFileBytes Directory Traversal Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Marvell QConvergeConsole. Authentication is not required to exploit this vulnerability. The specific flaw exists within the implementation of the getAppFileBytes method. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to disclose information in the context of SYSTEM. Was ZDI-CAN-24916.

AI-Powered Analysis

AILast updated: 07/07/2025, 15:13:30 UTC

Technical Analysis

CVE-2025-6796 is a high-severity security vulnerability classified as CWE-22, which pertains to improper limitation of a pathname to a restricted directory, commonly known as a path traversal vulnerability. This vulnerability affects Marvell's QConvergeConsole product, specifically version 5.5.0.78. The flaw resides in the implementation of the getAppFileBytes method, where the application fails to properly validate user-supplied file path inputs before performing file operations. As a result, an unauthenticated remote attacker can craft malicious requests to traverse directories outside the intended restricted paths and access sensitive files on the system. The vulnerability allows disclosure of sensitive information with SYSTEM-level privileges, which is the highest level of access on Windows systems, thereby significantly increasing the risk. The vulnerability does not require any authentication or user interaction to exploit, and the attack vector is network-based, making it accessible remotely. Although no known exploits have been reported in the wild yet, the CVSS v3.0 base score of 7.5 reflects a high severity due to the ease of exploitation and the potential impact on confidentiality. The vulnerability was publicly disclosed on July 7, 2025, and was initially reserved by the Zero Day Initiative (ZDI) under the identifier ZDI-CAN-24916. No official patches have been linked yet, which means affected organizations must prioritize mitigation strategies to reduce exposure. The path traversal vulnerability can lead to unauthorized disclosure of sensitive configuration files, credentials, or other critical data stored on the system, which could be leveraged for further attacks or lateral movement within a network.

Potential Impact

For European organizations using Marvell QConvergeConsole version 5.5.0.78, this vulnerability poses a significant risk to the confidentiality of sensitive information. Since exploitation requires no authentication and can be performed remotely, attackers can potentially access critical system files and data without any user credentials. This could lead to exposure of sensitive operational data, intellectual property, or credentials that could facilitate further compromise of internal networks. Given that QConvergeConsole is used in network management and monitoring, attackers gaining SYSTEM-level access could disrupt network operations or gather intelligence on network configurations. The impact is particularly severe for sectors with stringent data protection requirements such as finance, healthcare, and critical infrastructure within Europe, where unauthorized data disclosure could lead to regulatory penalties under GDPR and other compliance frameworks. Additionally, the lack of a patch increases the window of exposure, necessitating immediate defensive measures. While no active exploitation has been reported, the vulnerability’s characteristics make it an attractive target for threat actors aiming to conduct espionage or sabotage against European enterprises and government entities.

Mitigation Recommendations

Given the absence of an official patch, European organizations should implement several specific mitigation steps: 1) Restrict network access to the QConvergeConsole management interface by enforcing strict firewall rules and network segmentation to limit exposure to trusted IP addresses only. 2) Deploy Web Application Firewalls (WAFs) or Intrusion Prevention Systems (IPS) with custom rules to detect and block path traversal attempts targeting the getAppFileBytes method or suspicious URL patterns. 3) Conduct thorough audits of file permissions and ensure that the QConvergeConsole service runs with the least privilege necessary, reducing the impact if exploited. 4) Monitor logs for anomalous access patterns or unexpected file retrieval requests indicative of exploitation attempts. 5) Engage with Marvell support channels to obtain early access to patches or workarounds and plan for immediate application once available. 6) Consider temporary disabling or isolating the vulnerable service if feasible until a patch is released. 7) Educate IT and security teams about this vulnerability to increase awareness and readiness to respond to potential incidents.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
zdi
Date Reserved
2025-06-27T14:57:26.101Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 686bdfa06f40f0eb72ea12ac

Added to database: 7/7/2025, 2:54:24 PM

Last enriched: 7/7/2025, 3:13:30 PM

Last updated: 8/3/2025, 12:37:28 AM

Views: 7

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats