{ "dataType": "CVE_RECORD", "dataVersion": "5.1", "cveMetadata": { "cveId": "CVE-2025-8426", "assignerOrgId": "99f1926a-a320-47d8-bbb5-42feb611262e", "state": "PUBLISHED", "assignerShortName": "zdi", "dateReserved": "2025-07-31T17:08:28.669Z", "datePublished": "2025-07-31T17:57:54.748Z", "dateUpdated": "2025-07-31T18:26:02.364Z" }, "containers": { "cna": { "providerMetadata": { "orgId": "99f1926a-a320-47d8-bbb5-42feb611262e", "shortName": "zdi", "dateUpdated": "2025-07-31T17:57:54.748Z" }, "title": "Marvell QConvergeConsole compressConfigFiles Directory Traversal Information Disclosure and Denial-of-Service Vulnerability", "descriptions": [ { "lang": "en", "value": "Marvell QConvergeConsole compressConfigFiles Directory Traversal Information Disclosure and Denial-of-Service Vulnerability. This vulnerability allows remote attackers to disclose sensitive information or to create a denial-of-service condition on affected installations of Marvell QConvergeConsole. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the implementation of the compressConfigFiles method. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to disclose sensitive information or to create a denial-of-service condition on the system. Was ZDI-CAN-24915." } ], "affected": [ { "vendor": "Marvell", "product": "QConvergeConsole", "versions": [ { "version": "5.5.0.78", "status": "affected" } ], "defaultStatus": "unknown" } ], "problemTypes": [ { "descriptions": [ { "lang": "en", "cweId": "CWE-22", "description": "CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')", "type": "CWE" } ] } ], "references": [ { "url": "https://www.zerodayinitiative.com/advisories/ZDI-25-733/", "name": "ZDI-25-733", "tags": [ "x_research-advisory" ] } ], "dateAssigned": "2025-07-31T17:08:28.756Z", "datePublic": "2025-07-31T17:12:43.708Z", "source": { "lang": "en", "value": "Andrea Micalizzi aka rgod (@rgod777)" }, "metrics": [ { "format": "CVSS", "cvssV3_0": { "version": "3.0", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:H", "baseScore": 9.4, "baseSeverity": "CRITICAL" } } ] }, "adp": [ { "metrics": [ { "other": { "type": "ssvc", "content": { "timestamp": "2025-07-31T18:25:48.378788Z", "id": "CVE-2025-8426", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "version": "2.0.3" } } } ], "title": "CISA ADP Vulnrichment", "providerMetadata": { "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP", "dateUpdated": "2025-07-31T18:26:02.364Z" } } ] } }