CVE-2025-6799: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Marvell QConvergeConsole
Marvell QConvergeConsole getFileUploadBytes Directory Traversal Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Marvell QConvergeConsole. Authentication is not required to exploit this vulnerability. The specific flaw exists within the implementation of the getFileUploadBytes method. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to disclose information in the context of SYSTEM. Was ZDI-CAN-24919.
AI Analysis
Technical Summary
CVE-2025-6799 is a high-severity security vulnerability identified in Marvell's QConvergeConsole product, specifically version 5.5.0.78. The vulnerability is classified as CWE-22, which corresponds to an improper limitation of a pathname to a restricted directory, commonly known as a path traversal flaw. The root cause lies in the getFileUploadBytes method, where the software fails to properly validate user-supplied file paths before performing file operations. This lack of validation allows an unauthenticated remote attacker to craft malicious requests that traverse directories outside the intended scope, thereby accessing sensitive files on the system. Notably, exploitation does not require any authentication or user interaction, significantly lowering the barrier for attackers. The vulnerability enables disclosure of sensitive information with SYSTEM-level privileges, which implies that the attacker can read files with the highest level of access on the affected system. Although no known exploits are currently reported in the wild, the CVSS v3.0 base score of 7.5 indicates a high risk due to the combination of network attack vector, no required privileges, no user interaction, and high confidentiality impact. The vulnerability was publicly disclosed on July 7, 2025, and was tracked under ZDI-CAN-24919. No patches or mitigations have been officially released at the time of this report, emphasizing the need for immediate attention by affected organizations.
Potential Impact
For European organizations, the impact of CVE-2025-6799 can be significant, especially for those relying on Marvell QConvergeConsole for network device management or monitoring. The ability for unauthenticated attackers to remotely access sensitive system files can lead to exposure of confidential configuration data, credentials, or other critical information, potentially facilitating further attacks such as lateral movement, privilege escalation, or targeted espionage. Given that the vulnerability operates at SYSTEM privilege level, the confidentiality breach could be extensive. This risk is heightened in sectors with stringent data protection requirements, such as finance, healthcare, and critical infrastructure, where unauthorized disclosure could result in regulatory penalties, operational disruption, or reputational damage. Additionally, the vulnerability's network accessibility means attackers can exploit it remotely without needing to be on the internal network, increasing the attack surface. The absence of known exploits in the wild currently provides a window for proactive mitigation, but the high severity score and ease of exploitation necessitate urgent remediation to prevent potential future attacks.
Mitigation Recommendations
To mitigate CVE-2025-6799 effectively, European organizations should implement the following specific measures: 1) Immediate inventory and identification of all systems running Marvell QConvergeConsole version 5.5.0.78 to assess exposure. 2) Apply any available vendor patches or updates as soon as they are released; if no patch is available, consider temporary compensating controls such as network segmentation or firewall rules to restrict external access to the QConvergeConsole management interface. 3) Employ strict access control lists (ACLs) to limit which IP addresses or networks can reach the affected service, ideally restricting it to trusted internal management networks. 4) Monitor network traffic and system logs for unusual file access patterns or unauthorized requests targeting the getFileUploadBytes method or related endpoints. 5) Consider deploying Web Application Firewalls (WAFs) or Intrusion Prevention Systems (IPS) with custom rules to detect and block path traversal attempts. 6) Conduct security awareness and incident response drills focused on this vulnerability to ensure rapid detection and response. 7) Evaluate the feasibility of disabling or replacing the vulnerable component if patching is delayed, especially in high-risk environments. These targeted actions go beyond generic advice by focusing on immediate risk reduction and detection tailored to the vulnerability's characteristics.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Belgium, Sweden, Finland
CVE-2025-6799: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Marvell QConvergeConsole
Description
Marvell QConvergeConsole getFileUploadBytes Directory Traversal Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Marvell QConvergeConsole. Authentication is not required to exploit this vulnerability. The specific flaw exists within the implementation of the getFileUploadBytes method. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to disclose information in the context of SYSTEM. Was ZDI-CAN-24919.
AI-Powered Analysis
Technical Analysis
CVE-2025-6799 is a high-severity security vulnerability identified in Marvell's QConvergeConsole product, specifically version 5.5.0.78. The vulnerability is classified as CWE-22, which corresponds to an improper limitation of a pathname to a restricted directory, commonly known as a path traversal flaw. The root cause lies in the getFileUploadBytes method, where the software fails to properly validate user-supplied file paths before performing file operations. This lack of validation allows an unauthenticated remote attacker to craft malicious requests that traverse directories outside the intended scope, thereby accessing sensitive files on the system. Notably, exploitation does not require any authentication or user interaction, significantly lowering the barrier for attackers. The vulnerability enables disclosure of sensitive information with SYSTEM-level privileges, which implies that the attacker can read files with the highest level of access on the affected system. Although no known exploits are currently reported in the wild, the CVSS v3.0 base score of 7.5 indicates a high risk due to the combination of network attack vector, no required privileges, no user interaction, and high confidentiality impact. The vulnerability was publicly disclosed on July 7, 2025, and was tracked under ZDI-CAN-24919. No patches or mitigations have been officially released at the time of this report, emphasizing the need for immediate attention by affected organizations.
Potential Impact
For European organizations, the impact of CVE-2025-6799 can be significant, especially for those relying on Marvell QConvergeConsole for network device management or monitoring. The ability for unauthenticated attackers to remotely access sensitive system files can lead to exposure of confidential configuration data, credentials, or other critical information, potentially facilitating further attacks such as lateral movement, privilege escalation, or targeted espionage. Given that the vulnerability operates at SYSTEM privilege level, the confidentiality breach could be extensive. This risk is heightened in sectors with stringent data protection requirements, such as finance, healthcare, and critical infrastructure, where unauthorized disclosure could result in regulatory penalties, operational disruption, or reputational damage. Additionally, the vulnerability's network accessibility means attackers can exploit it remotely without needing to be on the internal network, increasing the attack surface. The absence of known exploits in the wild currently provides a window for proactive mitigation, but the high severity score and ease of exploitation necessitate urgent remediation to prevent potential future attacks.
Mitigation Recommendations
To mitigate CVE-2025-6799 effectively, European organizations should implement the following specific measures: 1) Immediate inventory and identification of all systems running Marvell QConvergeConsole version 5.5.0.78 to assess exposure. 2) Apply any available vendor patches or updates as soon as they are released; if no patch is available, consider temporary compensating controls such as network segmentation or firewall rules to restrict external access to the QConvergeConsole management interface. 3) Employ strict access control lists (ACLs) to limit which IP addresses or networks can reach the affected service, ideally restricting it to trusted internal management networks. 4) Monitor network traffic and system logs for unusual file access patterns or unauthorized requests targeting the getFileUploadBytes method or related endpoints. 5) Consider deploying Web Application Firewalls (WAFs) or Intrusion Prevention Systems (IPS) with custom rules to detect and block path traversal attempts. 6) Conduct security awareness and incident response drills focused on this vulnerability to ensure rapid detection and response. 7) Evaluate the feasibility of disabling or replacing the vulnerable component if patching is delayed, especially in high-risk environments. These targeted actions go beyond generic advice by focusing on immediate risk reduction and detection tailored to the vulnerability's characteristics.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- zdi
- Date Reserved
- 2025-06-27T14:57:40.093Z
- Cvss Version
- 3.0
- State
- PUBLISHED
Threat ID: 686bdfa06f40f0eb72ea12b5
Added to database: 7/7/2025, 2:54:24 PM
Last enriched: 7/7/2025, 3:12:36 PM
Last updated: 11/21/2025, 8:47:33 PM
Views: 35
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-11087: CWE-352 Cross-Site Request Forgery (CSRF) in zozothemes Zegen Core
HighCVE-2023-29479: n/a
MediumCVE-2025-13524: CWE-404 Improper Resource Shutdown or Release in AWS Wickr
MediumCVE-2025-36149: CWE-1021 Improper Restriction of Rendered UI Layers or Frames in IBM IBM Concert Software
MediumCVE-2023-22745: CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') in tpm2-software tpm2-tss
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.