CVE-2025-12490
📋 TL;DR
This vulnerability allows authenticated remote attackers to create arbitrary files on Netgate pfSense CE systems via a path traversal flaw in the Suricata package. Successful exploitation could lead to remote code execution with root privileges. Only pfSense CE installations with Suricata package enabled are affected.
💻 Affected Systems
- Netgate pfSense CE
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Full system compromise via remote code execution as root, allowing complete control over the firewall/router, data exfiltration, and lateral movement into connected networks.
Likely Case
Unauthorized file creation leading to persistence mechanisms, configuration manipulation, or privilege escalation to achieve RCE.
If Mitigated
Limited to authenticated users only, reducing attack surface to authorized personnel or compromised credentials.
🎯 Exploit Status
Authentication required but path traversal vulnerabilities are typically straightforward to exploit once authenticated.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Version containing commit 36b2303dfca35a1183d76f26bcc6ce26d4ea682d
Vendor Advisory: https://github.com/pfsense/FreeBSD-ports/commit/36b2303dfca35a1183d76f26bcc6ce26d4ea682d
Restart Required: Yes
Instructions:
1. Update pfSense CE to latest version. 2. Update Suricata package via Package Manager. 3. Restart Suricata service. 4. Reboot system for complete mitigation.
🔧 Temporary Workarounds
Disable Suricata Package
allTemporarily disable the Suricata intrusion detection/prevention system if not critically needed.
Navigate to Services > Suricata > Interfaces tab, disable all interfaces
Restrict Administrative Access
allLimit administrative access to pfSense web interface to trusted IP addresses only.
Navigate to System > Advanced > Admin Access, restrict IP addresses
🧯 If You Can't Patch
- Implement strict network segmentation to isolate pfSense management interface
- Enforce multi-factor authentication for all administrative accounts
🔍 How to Verify
Check if Vulnerable:
Check if Suricata package is installed and version is prior to fix commit 36b2303dfca35a1183d76f26bcc6ce26d4ea682d
Check Version:
pkg info | grep suricata
Verify Fix Applied:
Verify Suricata package version includes the fix commit and test path traversal attempts are blocked
📡 Detection & Monitoring
Log Indicators:
- Unusual file creation in system directories
- Suricata configuration modification attempts
- Multiple failed authentication attempts followed by successful login
Network Indicators:
- Unusual traffic patterns to pfSense management interface
- POST requests to Suricata configuration endpoints with path traversal patterns
SIEM Query:
source="pfSense" AND ("suricata" OR "path traversal" OR "../")