CVE-2025-12490

8.8 HIGH

📋 TL;DR

This vulnerability allows authenticated remote attackers to create arbitrary files on Netgate pfSense CE systems via a path traversal flaw in the Suricata package. Successful exploitation could lead to remote code execution with root privileges. Only pfSense CE installations with Suricata package enabled are affected.

💻 Affected Systems

Products:
  • Netgate pfSense CE
Versions: Versions prior to the fix commit 36b2303dfca35a1183d76f26bcc6ce26d4ea682d
Operating Systems: FreeBSD-based pfSense
Default Config Vulnerable: ✅ No
Notes: Only vulnerable if Suricata package is installed and enabled. pfSense Plus is not affected.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise via remote code execution as root, allowing complete control over the firewall/router, data exfiltration, and lateral movement into connected networks.

🟠

Likely Case

Unauthorized file creation leading to persistence mechanisms, configuration manipulation, or privilege escalation to achieve RCE.

🟢

If Mitigated

Limited to authenticated users only, reducing attack surface to authorized personnel or compromised credentials.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Authentication required but path traversal vulnerabilities are typically straightforward to exploit once authenticated.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version containing commit 36b2303dfca35a1183d76f26bcc6ce26d4ea682d

Vendor Advisory: https://github.com/pfsense/FreeBSD-ports/commit/36b2303dfca35a1183d76f26bcc6ce26d4ea682d

Restart Required: Yes

Instructions:

1. Update pfSense CE to latest version. 2. Update Suricata package via Package Manager. 3. Restart Suricata service. 4. Reboot system for complete mitigation.

🔧 Temporary Workarounds

Disable Suricata Package

all

Temporarily disable the Suricata intrusion detection/prevention system if not critically needed.

Navigate to Services > Suricata > Interfaces tab, disable all interfaces

Restrict Administrative Access

all

Limit administrative access to pfSense web interface to trusted IP addresses only.

Navigate to System > Advanced > Admin Access, restrict IP addresses

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate pfSense management interface
  • Enforce multi-factor authentication for all administrative accounts

🔍 How to Verify

Check if Vulnerable:

Check if Suricata package is installed and version is prior to fix commit 36b2303dfca35a1183d76f26bcc6ce26d4ea682d

Check Version:

pkg info | grep suricata

Verify Fix Applied:

Verify Suricata package version includes the fix commit and test path traversal attempts are blocked

📡 Detection & Monitoring

Log Indicators:

  • Unusual file creation in system directories
  • Suricata configuration modification attempts
  • Multiple failed authentication attempts followed by successful login

Network Indicators:

  • Unusual traffic patterns to pfSense management interface
  • POST requests to Suricata configuration endpoints with path traversal patterns

SIEM Query:

source="pfSense" AND ("suricata" OR "path traversal" OR "../")

🔗 References

📤 Share & Export