Skip to main content

CVE-2025-6803: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Marvell QConvergeConsole

High
VulnerabilityCVE-2025-6803cvecve-2025-6803cwe-22
Published: Mon Jul 07 2025 (07/07/2025, 14:50:21 UTC)
Source: CVE Database V5
Vendor/Project: Marvell
Product: QConvergeConsole

Description

Marvell QConvergeConsole compressDriverFiles Directory Traversal Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Marvell QConvergeConsole. Authentication is not required to exploit this vulnerability. The specific flaw exists within the implementation of the compressDriverFiles method. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to disclose information in the context of SYSTEM. Was ZDI-CAN-24923.

AI-Powered Analysis

AILast updated: 07/07/2025, 15:10:51 UTC

Technical Analysis

CVE-2025-6803 is a high-severity vulnerability classified as CWE-22, indicating an improper limitation of a pathname to a restricted directory, commonly known as a path traversal vulnerability. This flaw exists in the Marvell QConvergeConsole product, specifically in version 5.5.0.78. The vulnerability arises from the compressDriverFiles method, which fails to properly validate user-supplied file paths before performing file operations. As a result, an unauthenticated remote attacker can exploit this vulnerability to traverse directories and access sensitive files outside the intended directory scope. The attack can lead to information disclosure with SYSTEM-level privileges, meaning the attacker can read files with the highest system permissions, potentially exposing critical configuration files, credentials, or other sensitive data. No user interaction or authentication is required to exploit this vulnerability, increasing its risk profile. Although no public exploits are currently known in the wild, the vulnerability’s CVSS score of 7.5 (high) reflects its significant potential impact and ease of exploitation. The vulnerability was reserved and published in mid-2025, indicating it is a recent discovery. The lack of patch links suggests that a fix may not yet be publicly available or widely distributed, emphasizing the need for immediate attention by affected organizations.

Potential Impact

For European organizations, the impact of CVE-2025-6803 can be substantial, especially for those relying on Marvell QConvergeConsole for network device management or driver handling. The ability for unauthenticated attackers to disclose sensitive information with SYSTEM privileges can lead to exposure of critical infrastructure details, internal configurations, or credentials that could facilitate further attacks such as lateral movement, privilege escalation, or targeted espionage. This is particularly concerning for sectors with high regulatory requirements such as finance, healthcare, and critical infrastructure, where data confidentiality is paramount. The vulnerability could undermine trust in network management systems and potentially disrupt operational continuity if sensitive information is leaked or used maliciously. Given the lack of authentication and user interaction requirements, the attack surface is broad, increasing the likelihood of exploitation in environments where QConvergeConsole is accessible remotely or exposed to untrusted networks. This could also have compliance implications under GDPR if personal or sensitive data is disclosed.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should first identify all instances of Marvell QConvergeConsole version 5.5.0.78 within their environment. Immediate steps include restricting network access to the QConvergeConsole management interfaces to trusted internal networks only, using network segmentation and firewall rules to block unauthorized external access. Organizations should monitor logs for unusual file access patterns or directory traversal attempts targeting the compressDriverFiles method. Until an official patch is released, consider deploying virtual patching via Web Application Firewalls (WAFs) or Intrusion Prevention Systems (IPS) configured to detect and block path traversal payloads targeting this vulnerability. Additionally, implement strict input validation and sanitization controls where possible, and review system permissions to ensure that the QConvergeConsole service runs with the least privilege necessary to limit the impact of potential exploitation. Regularly check for vendor updates or security advisories to apply patches promptly once available. Conduct security awareness training for IT staff to recognize and respond to exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
zdi
Date Reserved
2025-06-27T14:58:05.214Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 686bdfa06f40f0eb72ea12cb

Added to database: 7/7/2025, 2:54:24 PM

Last enriched: 7/7/2025, 3:10:51 PM

Last updated: 8/3/2025, 12:37:28 AM

Views: 7

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats