CVE-2025-6807

7.5 HIGH

📋 TL;DR

This vulnerability allows remote attackers to read sensitive files on Marvell QConvergeConsole installations without authentication. Attackers can exploit a directory traversal flaw in the getDriverTmpPath method to access arbitrary files with SYSTEM privileges. All affected installations are vulnerable to information disclosure.

💻 Affected Systems

Products:
  • Marvell QConvergeConsole
Versions: Specific versions not detailed in advisory, but all vulnerable versions prior to patch
Operating Systems: Windows (based on SYSTEM context)
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in default configuration, no special configuration required for exploitation

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise through disclosure of credentials, configuration files, or other sensitive data leading to lateral movement or privilege escalation.

🟠

Likely Case

Disclosure of sensitive system information, configuration files, or application data that could facilitate further attacks.

🟢

If Mitigated

Limited impact if proper network segmentation and access controls prevent external access to vulnerable systems.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Directory traversal vulnerabilities are typically easy to exploit with simple HTTP requests

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Marvell advisory for specific patched version

Vendor Advisory: https://www.marvell.com/support/security-advisories.html

Restart Required: Yes

Instructions:

1. Check Marvell security advisory for affected versions. 2. Download and apply the latest patch from Marvell support portal. 3. Restart the QConvergeConsole service. 4. Verify the patch is applied successfully.

🔧 Temporary Workarounds

Network Access Restriction

all

Restrict network access to QConvergeConsole to trusted IP addresses only

Use firewall rules to limit access to specific source IPs

Authentication Enforcement

all

Implement additional authentication layer if possible

Configure web server authentication or implement reverse proxy with authentication

🧯 If You Can't Patch

  • Isolate vulnerable systems in separate network segments with strict access controls
  • Implement web application firewall (WAF) rules to block directory traversal patterns

🔍 How to Verify

Check if Vulnerable:

Test for directory traversal by attempting to access files outside the intended directory via the vulnerable endpoint

Check Version:

Check QConvergeConsole version in web interface or configuration files

Verify Fix Applied:

Attempt the same directory traversal test after patching; successful patch should return proper error instead of file contents

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests containing '../' patterns
  • Unusual file access patterns from external IPs
  • Failed authentication attempts followed by file access

Network Indicators:

  • HTTP requests with path traversal sequences to QConvergeConsole endpoints
  • Unusual outbound data transfers following traversal attempts

SIEM Query:

source="web_logs" AND (url="*../*" OR url="*..\\*" OR url="*%2e%2e%2f*") AND dest_ip="[QConvergeConsole_IP]"

🔗 References

📤 Share & Export