CVE-2025-5160

4.3 MEDIUM

📋 TL;DR

A path traversal vulnerability in H3C SecCenter SMP-E1114P02 allows attackers to access arbitrary files on the system by manipulating the 'Name' parameter in the /packetCaptureStrategy/download endpoint. This affects all versions up to 20250513. The vulnerability can be exploited remotely without authentication.

💻 Affected Systems

Products:
  • H3C SecCenter SMP-E1114P02
Versions: All versions up to 20250513
Operating Systems: Not specified, likely appliance-based
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the packet capture strategy download functionality specifically.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could read sensitive system files, configuration files, or credential files, potentially leading to full system compromise.

🟠

Likely Case

Unauthorized access to sensitive files containing configuration data, logs, or credentials.

🟢

If Mitigated

Limited access to non-critical files if proper file permissions and network segmentation are in place.

🌐 Internet-Facing: HIGH - The vulnerability can be exploited remotely and the exploit is publicly available.
🏢 Internal Only: MEDIUM - Internal attackers could exploit this to escalate privileges or access sensitive data.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit details have been publicly disclosed and the vulnerability requires minimal technical skill to exploit.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not available

Vendor Advisory: Not available - vendor did not respond to disclosure

Restart Required: No

Instructions:

No official patch available. Consider workarounds or upgrading to a version after 20250513 if available.

🔧 Temporary Workarounds

Network Access Restriction

linux

Restrict network access to the affected endpoint using firewall rules or network segmentation.

iptables -A INPUT -p tcp --dport [PORT] -s [TRUSTED_IPS] -j ACCEPT
iptables -A INPUT -p tcp --dport [PORT] -j DROP

Web Application Firewall

all

Deploy a WAF with path traversal protection rules to block malicious requests.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate the affected system from untrusted networks
  • Monitor for suspicious file access patterns and implement file integrity monitoring

🔍 How to Verify

Check if Vulnerable:

Test if the /packetCaptureStrategy/download endpoint accepts path traversal sequences in the Name parameter

Check Version:

Check system version through web interface or CLI (specific command varies by deployment)

Verify Fix Applied:

Verify that path traversal attempts are properly rejected or sanitized

📡 Detection & Monitoring

Log Indicators:

  • Unusual file access patterns
  • Requests to /packetCaptureStrategy/download with suspicious Name parameters
  • Failed file access attempts outside expected directories

Network Indicators:

  • HTTP requests containing '../' or similar path traversal sequences
  • Unusual file download patterns from the affected endpoint

SIEM Query:

source="web_logs" AND uri="/packetCaptureStrategy/download" AND (param="*../*" OR param="*..\\*" OR param="*%2e%2e%2f*")

🔗 References

📤 Share & Export