CVE-2025-6802

9.8 CRITICAL

📋 TL;DR

This vulnerability allows unauthenticated remote attackers to upload arbitrary files to Marvell QConvergeConsole servers, leading to remote code execution with SYSTEM privileges. All installations of affected Marvell QConvergeConsole versions are vulnerable. Attackers can exploit this without any authentication.

💻 Affected Systems

Products:
  • Marvell QConvergeConsole
Versions: Specific versions not detailed in advisory; all versions with vulnerable getFileFromURL method
Operating Systems: Windows (based on SYSTEM context)
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in default configuration; no special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with SYSTEM privileges, allowing attackers to install malware, steal data, pivot to other systems, or disrupt operations.

🟠

Likely Case

Remote code execution leading to ransomware deployment, data exfiltration, or creation of persistent backdoors.

🟢

If Mitigated

If properly segmented and monitored, impact limited to the affected system with detection of exploitation attempts.

🌐 Internet-Facing: HIGH - Unauthenticated remote exploitation makes internet-facing instances extremely vulnerable to automated attacks.
🏢 Internal Only: HIGH - Even internal instances are vulnerable to any network-accessible attacker, including compromised internal hosts.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Unrestricted file upload to RCE is a common attack pattern with readily available exploit techniques.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Marvell security advisory for specific patched versions

Vendor Advisory: https://www.marvell.com/support/security-advisories.html

Restart Required: Yes

Instructions:

1. Check Marvell security advisory for patched version
2. Download and install the patched version from Marvell support portal
3. Restart the QConvergeConsole service
4. Verify the patch is applied

🔧 Temporary Workarounds

Network Segmentation

all

Restrict network access to QConvergeConsole to only trusted management networks

firewall rules to block external access to QConvergeConsole ports

Web Application Firewall

all

Deploy WAF with file upload restrictions and RCE protection rules

🧯 If You Can't Patch

  • Immediately isolate affected systems from internet and untrusted networks
  • Implement strict network monitoring and alerting for exploitation attempts

🔍 How to Verify

Check if Vulnerable:

Check QConvergeConsole version against Marvell's patched version list in security advisory

Check Version:

Check QConvergeConsole web interface or installation directory for version information

Verify Fix Applied:

Verify installed version matches patched version from Marvell advisory and test file upload functionality

📡 Detection & Monitoring

Log Indicators:

  • Unusual file uploads to QConvergeConsole
  • GET/POST requests to getFileFromURL endpoint with file parameters
  • Execution of unexpected processes by QConvergeConsole service

Network Indicators:

  • HTTP requests to QConvergeConsole with file upload patterns from unexpected sources
  • Outbound connections from QConvergeConsole to suspicious destinations

SIEM Query:

source="qconvergeconsole" AND (url="*getFileFromURL*" OR method="POST" AND uri="*upload*")

🔗 References

📤 Share & Export