CVE-2025-57563

6.5 MEDIUM

📋 TL;DR

This vulnerability allows unauthenticated attackers to read arbitrary files on systems running vulnerable versions of StarNet FastX. Attackers can exploit a path traversal flaw to access sensitive system files without authentication. Organizations using FastX versions 4 through 4.1.51 are affected.

💻 Affected Systems

Products:
  • StarNet Communications Corporation FastX
Versions: v4 through v4.1.51
Operating Systems: All supported platforms where FastX runs
Default Config Vulnerable: ⚠️ Yes
Notes: All installations within the affected version range are vulnerable by default.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could read sensitive files including configuration files, passwords, SSH keys, and other credentials, potentially leading to full system compromise.

🟠

Likely Case

Attackers will read configuration files and sensitive data stored on the server, enabling further attacks or data exfiltration.

🟢

If Mitigated

With proper network segmentation and access controls, impact is limited to the FastX server itself rather than the entire network.

🌐 Internet-Facing: HIGH - Unauthenticated attackers can directly exploit this vulnerability from the internet.
🏢 Internal Only: MEDIUM - Internal attackers or compromised systems could exploit this to escalate privileges or move laterally.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability requires no authentication and path traversal attacks are typically straightforward to execute.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 4.1.52 or later

Vendor Advisory: https://www.starnet.com/fastx/

Restart Required: Yes

Instructions:

1. Download the latest version from StarNet website. 2. Backup current configuration. 3. Install the update. 4. Restart FastX services. 5. Verify the update was successful.

🔧 Temporary Workarounds

Network Access Restriction

all

Restrict network access to FastX servers to only trusted IP addresses or internal networks.

Use firewall rules to limit access: iptables -A INPUT -p tcp --dport [fastx-port] -s [trusted-ip] -j ACCEPT
iptables -A INPUT -p tcp --dport [fastx-port] -j DROP

Authentication Enforcement

all

Configure FastX to require authentication for all connections if not already enabled.

Edit FastX configuration to enforce authentication

🧯 If You Can't Patch

  • Isolate FastX servers in a separate network segment with strict access controls
  • Implement web application firewall (WAF) rules to block path traversal patterns

🔍 How to Verify

Check if Vulnerable:

Check FastX version via web interface or configuration files. Versions 4.0 through 4.1.51 are vulnerable.

Check Version:

Check FastX web interface or configuration files for version information

Verify Fix Applied:

Verify version is 4.1.52 or later and test that path traversal attempts are blocked.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file access patterns
  • Multiple failed path traversal attempts
  • Access to sensitive file paths in logs

Network Indicators:

  • Unusual HTTP requests with ../ patterns
  • Requests for sensitive file paths

SIEM Query:

source="fastx.log" AND ("../" OR "..\\" OR "/etc/" OR "/root/")

🔗 References

📤 Share & Export