CVE-2025-3722

4.4 MEDIUM

📋 TL;DR

A path traversal vulnerability in System Information Reporter (SIR) versions 1.0.3 and earlier allows authenticated high-privilege users to create or overwrite files anywhere on the filesystem via malicious ePO post requests. This could lead to sensitive information disclosure or system disruption. Only organizations using affected SIR versions are impacted.

💻 Affected Systems

Products:
  • System Information Reporter (SIR)
Versions: 1.0.3 and prior
Operating Systems: All supported OS for SIR
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated high-privilege user access to exploit.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Privileged attacker overwrites critical system files, causing system instability or complete compromise, while also exfiltrating sensitive data.

🟠

Likely Case

Malicious insider or compromised admin account creates backdoors, modifies configuration files, or accesses sensitive information stored elsewhere on the filesystem.

🟢

If Mitigated

Limited impact with proper access controls, monitoring, and network segmentation preventing unauthorized file operations.

🌐 Internet-Facing: LOW - Requires authenticated high-privilege access, making direct internet exploitation unlikely unless management interfaces are exposed.
🏢 Internal Only: MEDIUM - Significant risk from insider threats or compromised admin accounts within the network perimeter.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated high-privilege access but path traversal techniques are well-understood.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.0.4 or later

Vendor Advisory: https://thrive.trellix.com/s/article/000014635

Restart Required: Yes

Instructions:

1. Download SIR version 1.0.4 or later from official vendor sources. 2. Backup current configuration. 3. Stop SIR service. 4. Install updated version. 5. Restart SIR service. 6. Verify functionality.

🔧 Temporary Workarounds

Restrict ePO Post Request Access

all

Limit network access to SIR ePO endpoints to only trusted management systems.

Use firewall rules to restrict access to SIR port (typically 8443) to specific IP addresses

Implement Least Privilege

all

Reduce number of users with high-privilege access to SIR administration.

Review and minimize admin accounts with SIR access

🧯 If You Can't Patch

  • Implement strict file system permissions to limit where SIR service account can write
  • Enable detailed logging of all ePO post requests and file operations for anomaly detection

🔍 How to Verify

Check if Vulnerable:

Check SIR version via administration interface or configuration files. Versions 1.0.3 or earlier are vulnerable.

Check Version:

Check SIR web interface or configuration file for version information

Verify Fix Applied:

Confirm SIR version is 1.0.4 or later and test that path traversal attempts in ePO requests are properly rejected.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file creation events outside expected directories
  • Multiple failed path traversal attempts in SIR logs
  • Suspicious ePO post requests with directory traversal patterns (../)

Network Indicators:

  • Unusual ePO traffic patterns to SIR endpoints
  • POST requests containing path traversal sequences

SIEM Query:

source="sir_logs" AND ("../" OR "..\\" OR "%2e%2e%2f") AND method="POST"

🔗 References

📤 Share & Export