CVE-2025-6795

7.5 HIGH

📋 TL;DR

This vulnerability allows unauthenticated remote attackers to perform directory traversal attacks on Marvell QConvergeConsole installations. By exploiting the getFileUploadSize method's improper path validation, attackers can read arbitrary files on the system with SYSTEM privileges. All affected installations are vulnerable without authentication.

💻 Affected Systems

Products:
  • Marvell QConvergeConsole
Versions: Specific versions not specified in advisory - all vulnerable versions before patch
Operating Systems: Windows (based on SYSTEM context reference)
Default Config Vulnerable: ⚠️ Yes
Notes: Authentication is not required to exploit this vulnerability. The vulnerability exists in the web interface component.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise via sensitive file disclosure (passwords, configuration files, private keys) leading to lateral movement, data exfiltration, or further exploitation.

🟠

Likely Case

Information disclosure of sensitive system files, potentially exposing credentials, configuration data, or other sensitive information that could enable further attacks.

🟢

If Mitigated

Limited impact if proper network segmentation and access controls prevent external access to vulnerable systems.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Directory traversal vulnerabilities typically have low exploitation complexity. The ZDI advisory suggests active exploitation is possible.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Marvell security advisory for specific patched version

Vendor Advisory: https://www.marvell.com/support/security-center.html

Restart Required: Yes

Instructions:

1. Check Marvell security advisory for specific patch version
2. Download and apply the latest QConvergeConsole update from Marvell support portal
3. Restart the QConvergeConsole service
4. Verify the patch is applied successfully

🔧 Temporary Workarounds

Network Access Restriction

windows

Restrict network access to QConvergeConsole to trusted IP addresses only

Windows Firewall: New-NetFirewallRule -DisplayName 'Block QConvergeConsole External' -Direction Inbound -Protocol TCP -LocalPort [QCC_PORT] -RemoteAddress 'Internet' -Action Block

Web Application Firewall

all

Implement WAF rules to block directory traversal patterns

🧯 If You Can't Patch

  • Immediately restrict network access to trusted management networks only
  • Monitor logs for directory traversal attempts and file access patterns

🔍 How to Verify

Check if Vulnerable:

Check if QConvergeConsole is running and accessible without authentication. Test with directory traversal payloads to the getFileUploadSize endpoint.

Check Version:

Check QConvergeConsole web interface or installation directory for version information

Verify Fix Applied:

Verify patch version matches or exceeds the fixed version in Marvell advisory. Test that directory traversal attempts no longer succeed.

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests containing '../' or directory traversal patterns to getFileUploadSize endpoint
  • Unusual file access patterns from web service account

Network Indicators:

  • HTTP requests with path traversal sequences (../, ..\, %2e%2e%2f)
  • Unusual outbound traffic following file access attempts

SIEM Query:

source='web_logs' AND (uri='*getFileUploadSize*' AND (uri='*../*' OR uri='*..\\*' OR uri='*%2e%2e*'))

🔗 References

📤 Share & Export