CVE-2025-24494

7.2 HIGH

📋 TL;DR

This path traversal vulnerability in Ixia/IxNetwork products allows device administrators to upload malicious files to arbitrary locations, potentially leading to remote code execution. It affects systems running vulnerable versions of Ixia/IxNetwork software. Regular users cannot exploit this vulnerability - only privileged device admin accounts.

💻 Affected Systems

Products:
  • Ixia/IxNetwork products
Versions: Versions prior to 6.7.0
Operating Systems: Not specified - likely multiple OS platforms supported by Ixia/IxNetwork
Default Config Vulnerable: ⚠️ Yes
Notes: Requires device admin account privileges; regular users cannot exploit. Upload functionality must be accessible.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Privileged attacker gains full system control via arbitrary code execution, potentially compromising the entire network testing environment and adjacent systems.

🟠

Likely Case

Malicious administrator or compromised admin account uploads and executes scripts to steal sensitive test data, modify configurations, or establish persistence.

🟢

If Mitigated

With proper access controls and admin account monitoring, impact limited to authorized administrative actions within expected boundaries.

🌐 Internet-Facing: MEDIUM - While requires admin credentials, internet-facing interfaces increase attack surface for credential theft/brute force.
🏢 Internal Only: HIGH - Internal privileged users or compromised admin accounts can exploit without external access requirements.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires admin credentials and knowledge of upload functionality. Path traversal combined with file upload leads to RCE.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 6.7.0

Vendor Advisory: https://support.ixiacom.com/

Restart Required: No

Instructions:

1. Download version 6.7.0 or later from Ixia support portal. 2. Backup current configuration. 3. Install update following vendor documentation. 4. Verify version shows 6.7.0 or higher.

🔧 Temporary Workarounds

Restrict Admin Account Access

all

Limit device admin accounts to minimum necessary personnel and implement multi-factor authentication

Disable Unnecessary Upload Features

all

If upload functionality not required for operations, disable via configuration or access controls

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Ixia/IxNetwork systems from critical infrastructure
  • Enable detailed logging and monitoring of all admin account activities and file upload operations

🔍 How to Verify

Check if Vulnerable:

Check current software version via product interface or command line. If version is below 6.7.0, system is vulnerable.

Check Version:

Check via product GUI (Help > About) or consult vendor documentation for CLI version check

Verify Fix Applied:

Confirm version is 6.7.0 or higher. Test upload functionality with path traversal attempts to verify sanitization.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file upload patterns by admin accounts
  • Path traversal strings in upload requests
  • Execution of unexpected scripts/binaries

Network Indicators:

  • Unexpected outbound connections from Ixia systems
  • File uploads to non-standard paths

SIEM Query:

source="ixia_logs" AND (event="file_upload" AND (path LIKE "../%" OR path LIKE "..\\%")) OR (user="admin" AND process_execution="unexpected")

🔗 References

📤 Share & Export