CVE-2025-34098
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-07-10

Last updated on: 2025-07-15

Assigner: VulnCheck

Description
A path traversal vulnerability exists in Riverbed SteelHead VCX appliances (confirmed in VCX255U 9.6.0a) due to improper input validation in the log filtering functionality exposed via the management web interface. An authenticated attacker can exploit this flaw by submitting crafted filter expressions to the log_filter endpoint using the filterStr parameter. This input is processed by a backend parser that permits execution of file expansion syntax, allowing the attacker to retrieve arbitrary system files via the log viewing interface.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-07-10
Last Modified
2025-07-15
Generated
2026-05-07
AI Q&A
2025-07-10
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
riverbed steelhead_vcx 9.6.0a
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-200 The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a path traversal flaw in Riverbed SteelHead VCX appliances, specifically confirmed in version VCX255U 9.6.0a. It occurs because the log filtering functionality on the management web interface does not properly validate input. An authenticated attacker can send specially crafted filter expressions to the log_filter endpoint using the filterStr parameter. Due to the backend parser allowing file expansion syntax, the attacker can exploit this to access arbitrary system files through the log viewing interface.


How can this vulnerability impact me? :

An attacker with valid credentials can exploit this vulnerability to read arbitrary system files on the affected appliance. This could lead to exposure of sensitive information stored on the device, potentially compromising system security and confidentiality.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart