CVE-2025-48017

9.0 CRITICAL

📋 TL;DR

This vulnerability allows attackers to modify and upload arbitrary files by exploiting improper pathname limitations in Circuit Provisioning and File Import applications. It affects SEL (Schweitzer Engineering Laboratories) software products that include these applications. Attackers could potentially gain unauthorized access or disrupt operations.

💻 Affected Systems

Products:
  • SEL Circuit Provisioning and File Import applications
Versions: Specific versions not detailed in reference; check SEL advisory for affected versions
Operating Systems: Not specified, likely Windows/Linux platforms running SEL software
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in applications handling file operations; exact configurations require checking SEL documentation

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing remote code execution, data theft, or service disruption through arbitrary file uploads.

🟠

Likely Case

Unauthorized file modification leading to configuration changes, data corruption, or privilege escalation.

🟢

If Mitigated

Limited impact with proper file permission controls and network segmentation in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Path traversal vulnerabilities typically have low complexity but may require authentication; check SEL advisory for specifics

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check SEL's latest software versions at provided URL

Vendor Advisory: https://selinc.com/products/software/latest-software-versions/

Restart Required: Yes

Instructions:

1. Visit SEL's software versions page. 2. Identify affected products. 3. Download and install latest patched versions. 4. Restart affected services/systems.

🔧 Temporary Workarounds

Restrict File Upload Permissions

linux

Limit file upload capabilities to trusted directories with strict permissions

chmod 750 /path/to/upload/directory
chown root:root /path/to/upload/directory

Implement Input Validation

all

Add path traversal validation to file upload functions

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate affected systems
  • Deploy web application firewall with path traversal protection rules

🔍 How to Verify

Check if Vulnerable:

Check application version against SEL's advisory; test file upload with path traversal payloads (e.g., ../../../etc/passwd)

Check Version:

Check application interface or configuration files for version information

Verify Fix Applied:

Verify installed version matches patched version; retest with path traversal attempts

📡 Detection & Monitoring

Log Indicators:

  • Unusual file upload patterns
  • Path traversal strings in file operations
  • Failed authentication attempts followed by file uploads

Network Indicators:

  • HTTP requests containing ../ sequences in file upload parameters
  • Unusual file transfer patterns to/from affected systems

SIEM Query:

source="*sel*" AND ("../" OR "..\" OR "%2e%2e%2f")

🔗 References

📤 Share & Export