CVE-2025-58078

7.5 HIGH

📋 TL;DR

An unauthenticated remote attacker can exploit a relative path traversal vulnerability in Productivity Suite software to write arbitrary files to the target system. This affects users running version 4.4.1.19 of the software, potentially allowing file system manipulation without authentication.

💻 Affected Systems

Products:
  • Productivity Suite software
Versions: Version 4.4.1.19
Operating Systems: Windows (based on typical Productivity Suite deployment)
Default Config Vulnerable: ⚠️ Yes
Notes: Specifically affects the ProductivityService PLC simulator component. Systems with this service exposed are vulnerable.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise through arbitrary file writes leading to remote code execution, data destruction, or ransomware deployment.

🟠

Likely Case

File system corruption, data loss, or installation of backdoors/malware on vulnerable systems.

🟢

If Mitigated

Limited impact if network segmentation and access controls prevent unauthenticated access to the vulnerable service.

🌐 Internet-Facing: HIGH - Unauthenticated remote exploitation allows attackers to directly target exposed systems.
🏢 Internal Only: HIGH - Even internally, unauthenticated access to the vulnerable service presents significant risk.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability description indicates unauthenticated remote exploitation is possible, suggesting straightforward attack vectors.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor updates - likely version >4.4.1.19

Vendor Advisory: https://www.cisa.gov/news-events/ics-advisories/icsa-25-296-01

Restart Required: Yes

Instructions:

1. Download latest version from vendor site. 2. Backup current installation. 3. Install update following vendor instructions. 4. Restart system/service.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict network access to ProductivityService to trusted hosts only

Use firewall rules to block port 1962/tcp (common Productivity Suite port) from untrusted networks

Service Disablement

windows

Disable ProductivityService PLC simulator if not required

sc stop ProductivityService
sc config ProductivityService start= disabled

🧯 If You Can't Patch

  • Implement strict network access controls to limit exposure of ProductivityService
  • Monitor file system writes and network traffic to/from ProductivityService for anomalies

🔍 How to Verify

Check if Vulnerable:

Check software version in About dialog or registry: HKEY_LOCAL_MACHINE\SOFTWARE\ProductivitySuite\Version

Check Version:

reg query "HKLM\SOFTWARE\ProductivitySuite" /v Version

Verify Fix Applied:

Verify version is updated beyond 4.4.1.19 and test file write attempts to restricted paths fail

📡 Detection & Monitoring

Log Indicators:

  • Unusual file write operations by ProductivityService
  • Access attempts from unauthorized IP addresses to ProductivityService port

Network Indicators:

  • Traffic to ProductivityService port (typically 1962/tcp) from unexpected sources
  • File transfer patterns to unusual paths

SIEM Query:

source="ProductivityService" AND (event_type="file_write" OR destination_path CONTAINS "..\\")

🔗 References

📤 Share & Export