CVE-2025-47184

5.3 MEDIUM
XXE

📋 TL;DR

An authenticated attacker can exploit an XML external entities (XXE) injection vulnerability in Exagrid EX10's /init API endpoint to read sensitive files and escalate privileges. This affects Exagrid EX10 systems running vulnerable software versions before specific patch levels. Attackers need valid credentials but no special privileges.

💻 Affected Systems

Products:
  • Exagrid EX10
Versions: Before 6.4.0 P20, 7.0.1 P12, and 7.2.0 P08
Operating Systems: Exagrid's proprietary OS
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access to the /init API endpoint. Unprivileged users can exploit this vulnerability.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise via privilege escalation leading to data exfiltration, system manipulation, or lateral movement within the network.

🟠

Likely Case

Information disclosure of sensitive system files, configuration data, or credentials stored on the Exagrid appliance.

🟢

If Mitigated

Limited impact due to network segmentation, strict access controls, and monitoring preventing successful exploitation.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires crafting malicious ISys XML messages and sending them to the vulnerable endpoint. Authentication is required but no special privileges.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 6.4.0 P20, 7.0.1 P12, or 7.2.0 P08

Vendor Advisory: https://www.exagrid.com/exagrid-products/exagrid-product-line/

Restart Required: No

Instructions:

1. Identify your current Exagrid EX10 software version. 2. Download the appropriate patch from Exagrid support portal. 3. Apply the patch following Exagrid's update procedures. 4. Verify the update was successful.

🔧 Temporary Workarounds

Disable XXE Processing

all

Configure the XML parser to disable external entity resolution if supported by the application.

Restrict API Access

all

Implement network segmentation and firewall rules to limit access to the /init API endpoint to only trusted systems.

🧯 If You Can't Patch

  • Implement strict access controls and monitor all access to the /init API endpoint.
  • Deploy network segmentation to isolate Exagrid systems from untrusted networks.

🔍 How to Verify

Check if Vulnerable:

Check the Exagrid EX10 software version via the management interface or CLI. If version is before 6.4.0 P20, 7.0.1 P12, or 7.2.0 P08, the system is vulnerable.

Check Version:

Check via Exagrid web interface or consult Exagrid documentation for CLI commands specific to your deployment.

Verify Fix Applied:

After patching, verify the software version shows 6.4.0 P20, 7.0.1 P12, or 7.2.0 P08 or later.

📡 Detection & Monitoring

Log Indicators:

  • Unusual XML parsing errors in application logs
  • Multiple failed authentication attempts followed by XML requests to /init endpoint
  • Outbound connections to external domains from the Exagrid system

Network Indicators:

  • XML payloads containing external entity declarations sent to /init API endpoint
  • Unusual data exfiltration patterns from the Exagrid system

SIEM Query:

source="exagrid" AND (uri_path="/init" AND content_type="application/xml") AND (xml_content CONTAINS "<!ENTITY" OR xml_content CONTAINS "SYSTEM")

🔗 References

📤 Share & Export