CVE-2025-12055

7.5 HIGH

📋 TL;DR

This vulnerability allows unauthenticated attackers to read arbitrary files from the Windows operating system on affected MPDV Mikrolab systems. It affects HYDRA X, MIP 2, and FEDRA 2 products through a vulnerable 'Filename' parameter in the public $SCHEMAS$ resource. All organizations using these products before Maintenance Pack 36 with Servicepack 8 are at risk.

💻 Affected Systems

Products:
  • HYDRA X
  • MIP 2
  • FEDRA 2
Versions: All releases until Maintenance Pack 36 with Servicepack 8 (week 36/2025)
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the public $SCHEMAS$ resource which appears to be accessible by default.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could read sensitive system files, configuration files, password files, or other critical data, potentially leading to full system compromise or data exfiltration.

🟠

Likely Case

Attackers will read configuration files, log files, and other accessible system files to gather intelligence for further attacks or to steal sensitive information.

🟢

If Mitigated

With proper network segmentation and access controls, the impact is limited to file disclosure within the segmented network zone.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability description states it can be 'exploited easily' and references include security advisories with technical details.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Maintenance Pack 36 with Servicepack 8 (week 36/2025) or later

Vendor Advisory: https://r.sec-consult.com/mpdv

Restart Required: Yes

Instructions:

1. Download Maintenance Pack 36 with Servicepack 8 or later from MPDV Mikrolab. 2. Apply the update following vendor instructions. 3. Restart affected systems as required.

🔧 Temporary Workarounds

Block access to vulnerable endpoint

all

Restrict network access to the $SCHEMAS$ resource using firewall rules or web application firewall.

Network segmentation

all

Isolate affected systems from untrusted networks and limit access to authorized users only.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate affected systems from untrusted networks
  • Deploy web application firewall rules to block malicious requests to the $SCHEMAS$ resource

🔍 How to Verify

Check if Vulnerable:

Test if the $SCHEMAS$ resource accepts arbitrary file paths in the Filename parameter. Attempt to read a known system file like C:\Windows\win.ini.

Check Version:

Check system version through MPDV Mikrolab administration interface or consult vendor documentation.

Verify Fix Applied:

After patching, verify that the $SCHEMAS$ resource no longer accepts arbitrary file paths and returns appropriate error messages.

📡 Detection & Monitoring

Log Indicators:

  • Unusual access patterns to $SCHEMAS$ resource
  • Requests with file paths in Filename parameter
  • Failed file access attempts from unauthorized sources

Network Indicators:

  • HTTP requests to $SCHEMAS$ endpoint with file path parameters
  • Traffic patterns indicating file enumeration

SIEM Query:

source="web_logs" AND uri="*$SCHEMAS$*" AND (parameter="Filename" OR parameter="*..\*" OR parameter="*../*")

🔗 References

📤 Share & Export