CVE-2025-57618

7.3 HIGH

📋 TL;DR

A path traversal vulnerability in FastX3 allows unauthenticated attackers to read arbitrary server files, including configuration files containing JWT secret keys. Attackers can forge valid JWTs to impersonate the root user and achieve remote code execution. All FastX3 installations through version 3.3.67 are affected.

💻 Affected Systems

Products:
  • FastX3
Versions: through 3.3.67
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations are vulnerable. The vulnerability exists in the file access mechanism.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise via remote code execution as root, leading to data theft, lateral movement, and persistent backdoors.

🟠

Likely Case

Unauthorized file access leading to JWT secret theft, authentication bypass, and privilege escalation to root.

🟢

If Mitigated

Limited to file disclosure if JWT signing is disabled or configuration files are properly secured.

🌐 Internet-Facing: HIGH - Unauthenticated exploit allows remote attackers to compromise exposed servers.
🏢 Internal Only: HIGH - Internal attackers can exploit this to gain root privileges and move laterally.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Path traversal to file read is straightforward. JWT forgery requires basic cryptographic knowledge.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.3.68 or later

Vendor Advisory: https://www.starnet.com/help/fastx3-3-server-release-notes/

Restart Required: Yes

Instructions:

1. Download FastX3 version 3.3.68 or later from StarNet website. 2. Stop FastX3 service. 3. Install the update. 4. Restart FastX3 service.

🔧 Temporary Workarounds

Network Access Restriction

linux

Restrict network access to FastX3 server to trusted IPs only.

iptables -A INPUT -p tcp --dport [FASTX_PORT] -s [TRUSTED_IP] -j ACCEPT
iptables -A INPUT -p tcp --dport [FASTX_PORT] -j DROP

File Permission Hardening

linux

Restrict read access to configuration files containing JWT secrets.

chmod 600 /path/to/fastx/config/*.conf
chown root:root /path/to/fastx/config/*.conf

🧯 If You Can't Patch

  • Implement network segmentation to isolate FastX3 servers from critical systems.
  • Monitor for unusual file access patterns and JWT usage anomalies.

🔍 How to Verify

Check if Vulnerable:

Check FastX3 version: if version ≤ 3.3.67, system is vulnerable.

Check Version:

fastx-server --version

Verify Fix Applied:

Confirm FastX3 version is 3.3.68 or later and test path traversal attempts return proper errors.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file access patterns in FastX logs
  • Multiple failed path traversal attempts
  • JWT validation errors

Network Indicators:

  • HTTP requests with ../ sequences in URLs
  • Unusual authentication patterns

SIEM Query:

source="fastx.log" AND ("../" OR "..\\" OR "%2e%2e%2f")

🔗 References

📤 Share & Export