CVE-2025-62577

8.8 HIGH

📋 TL;DR

ETERNUS SF storage management software contains an incorrect default permissions vulnerability that allows low-privileged users to access database credentials. This can lead to OS command execution with administrator privileges. Organizations using affected versions of ETERNUS SF are at risk.

💻 Affected Systems

Products:
  • ETERNUS SF
Versions: All versions prior to the security update
Operating Systems: Windows Server, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Requires low-privileged user access to the management server interface.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with administrator-level command execution, data exfiltration, and lateral movement across the network.

🟠

Likely Case

Database credential theft leading to unauthorized data access, privilege escalation, and potential ransomware deployment.

🟢

If Mitigated

Limited impact if proper access controls, network segmentation, and monitoring are implemented.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated low-privileged access but follows straightforward steps once access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Security update released October 20, 2025

Vendor Advisory: https://www.fujitsu.com/global/support/products/computing/storage/20251020/index.html

Restart Required: Yes

Instructions:

1. Download the security update from Fujitsu's support portal. 2. Backup current configuration. 3. Apply the update following vendor instructions. 4. Restart the ETERNUS SF service. 5. Verify permissions are corrected.

🔧 Temporary Workarounds

Restrict Management Server Access

all

Limit access to ETERNUS SF management interface to only authorized administrators using network controls.

Review and Tighten User Permissions

all

Audit all user accounts with access to ETERNUS SF and remove unnecessary low-privileged accounts.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate ETERNUS SF management servers from other critical systems.
  • Enable detailed logging and monitoring for unauthorized access attempts to database credential files.

🔍 How to Verify

Check if Vulnerable:

Check if ETERNUS SF version is prior to the October 2025 security update and verify low-privileged users can access database configuration files.

Check Version:

Check ETERNUS SF version through the management console or vendor-provided version check utility.

Verify Fix Applied:

Confirm the security update is installed and test that low-privileged users can no longer access database credential files.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to database configuration files
  • Unusual privilege escalation events
  • Suspicious database connection attempts from non-admin accounts

Network Indicators:

  • Unexpected outbound connections from ETERNUS SF server
  • Database connection attempts from unauthorized IPs

SIEM Query:

source="ETERNUS-SF" AND (event_type="file_access" AND file_path="*database*config*") AND user_privilege="low"

🔗 References

📤 Share & Export