CVE-2025-5158
📋 TL;DR
This CVE describes a path traversal vulnerability in H3C SecCenter SMP-E1114P02 that allows attackers to access arbitrary files on the system by manipulating the filename parameter in the downloadSoftware function. The vulnerability affects systems running versions up to 20250513 and can be exploited remotely without authentication.
💻 Affected Systems
- H3C SecCenter SMP-E1114P02
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Attackers could read sensitive system files, configuration files, or credentials, potentially leading to full system compromise.
Likely Case
Unauthorized file access leading to information disclosure of configuration files, logs, or other sensitive data.
If Mitigated
Limited impact if proper network segmentation and access controls prevent external exploitation.
🎯 Exploit Status
Exploit details have been publicly disclosed and the vulnerability is remotely exploitable without authentication.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: None available
Restart Required: No
Instructions:
No official patch available. Contact H3C support for updates and monitor their security advisories.
🔧 Temporary Workarounds
Network Access Restriction
allRestrict network access to the vulnerable endpoint (/cfgFile/downloadSoftware) using firewall rules or network segmentation.
Input Validation
allImplement input validation to reject filename parameters containing path traversal sequences (../, ..\) if custom modifications are possible.
🧯 If You Can't Patch
- Isolate the affected system in a restricted network segment with no internet access
- Implement strict firewall rules to allow only trusted IP addresses to access the vulnerable endpoint
🔍 How to Verify
Check if Vulnerable:
Check if the system is running H3C SecCenter SMP-E1114P02 version 20250513 or earlier and if the /cfgFile/downloadSoftware endpoint is accessible.
Check Version:
Check system configuration or web interface for version information (specific command unknown)
Verify Fix Applied:
Verify that the system has been updated to a version after 20250513 or that the vulnerable endpoint is no longer accessible.
📡 Detection & Monitoring
Log Indicators:
- Unusual access patterns to /cfgFile/downloadSoftware
- Requests with filename parameters containing path traversal sequences
Network Indicators:
- HTTP requests to /cfgFile/downloadSoftware with suspicious filename parameters
SIEM Query:
http.url:"/cfgFile/downloadSoftware" AND (http.param.filename:"../" OR http.param.filename:"..\\")