CVE-2025-54317

8.4 HIGH

📋 TL;DR

A path traversal vulnerability in Logpoint versions before 7.6.0 allows authenticated attackers with operator privileges to create malicious Layout Templates that can lead to remote code execution. This affects all Logpoint deployments running vulnerable versions. Attackers can potentially gain full system control.

💻 Affected Systems

Products:
  • Logpoint
Versions: All versions before 7.6.0
Operating Systems: Linux-based deployments
Default Config Vulnerable: ⚠️ Yes
Notes: Requires operator privileges to exploit. All default configurations are vulnerable if running affected versions.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with attacker gaining root/system-level access, data exfiltration, lateral movement, and persistent backdoor installation.

🟠

Likely Case

Attacker with operator credentials achieves RCE, potentially compromising the Logpoint server and accessing sensitive log data.

🟢

If Mitigated

Limited impact due to proper access controls, network segmentation, and monitoring preventing successful exploitation.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires operator credentials but is straightforward once authenticated. No public exploit code identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 7.6.0

Vendor Advisory: https://servicedesk.logpoint.com/hc/en-us/articles/28685507675549-Path-Traversal-in-Layout-Templates-Allows-Remote-Code-Execution

Restart Required: Yes

Instructions:

1. Backup current configuration. 2. Download Logpoint 7.6.0 from official sources. 3. Follow Logpoint upgrade documentation. 4. Restart services after upgrade. 5. Verify version is 7.6.0 or higher.

🔧 Temporary Workarounds

Restrict Operator Privileges

all

Temporarily reduce number of users with operator privileges to essential personnel only.

Monitor Layout Template Creation

all

Implement alerting for any Layout Template creation/modification activities.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Logpoint from critical systems
  • Enforce multi-factor authentication for all operator accounts and review access logs daily

🔍 How to Verify

Check if Vulnerable:

Check Logpoint version via web interface or command line. If version is below 7.6.0, system is vulnerable.

Check Version:

Check web interface admin panel or consult Logpoint documentation for version check command specific to your deployment.

Verify Fix Applied:

Confirm version is 7.6.0 or higher and test Layout Template functionality for path traversal attempts.

📡 Detection & Monitoring

Log Indicators:

  • Unusual Layout Template creation/modification events
  • Path traversal patterns in template names or content
  • Suspicious file operations from Logpoint processes

Network Indicators:

  • Unexpected outbound connections from Logpoint server
  • Anomalous network traffic patterns

SIEM Query:

source="logpoint" AND (event_type="template_creation" OR event_type="template_modification") AND (template_name CONTAINS ".." OR template_name CONTAINS "/" OR template_name CONTAINS "\")

🔗 References

📤 Share & Export