CVE-2025-34112
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-07-15

Last updated on: 2025-07-15

Assigner: VulnCheck

Description
An authenticated multi-stage remote code execution vulnerability exists in Riverbed SteelCentral NetProfiler and NetExpress 10.8.7 virtual appliances. A SQL injection vulnerability in the '/api/common/1.0/login' endpoint can be exploited to create a new user account in the appliance database. This user can then trigger a command injection vulnerability in the '/index.php?page=licenses' endpoint to execute arbitrary commands. The attacker may escalate privileges to root by exploiting an insecure sudoers configuration that allows the 'mazu' user to execute arbitrary commands as root via SSH key extraction and command chaining. Successful exploitation allows full remote root access to the virtual appliance.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-07-15
Last Modified
2025-07-15
Generated
2026-05-07
AI Q&A
2025-07-15
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
riverbed netexpress 10.8.7
riverbed steelcentral_netprofiler 10.8.7
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-266 A product incorrectly assigns a privilege to a particular actor, creating an unintended sphere of control for that actor.
CWE-306 The product does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources.
CWE-89 The product constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component. Without sufficient removal or quoting of SQL syntax in user-controllable inputs, the generated SQL query can cause those inputs to be interpreted as SQL instead of ordinary user data.
CWE-78 The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2025-34112 is a critical vulnerability in Riverbed SteelCentral NetProfiler and NetExpress 10.8.7 virtual appliances that allows an attacker to remotely execute code as the root user. It involves a chain of three security flaws: first, a SQL injection in the login API endpoint lets the attacker create a new user account in the appliance database; second, a command injection vulnerability in the web interface allows execution of arbitrary shell commands using that account; third, an insecure sudoers configuration enables privilege escalation to root by extracting the root SSH private key and using it to gain root access via SSH. Successful exploitation results in full remote root access to the appliance. [1, 2, 3]


How can this vulnerability impact me? :

This vulnerability can have severe impacts including complete compromise of the affected virtual appliance. An attacker can remotely execute arbitrary commands with root privileges, leading to full control over the system. This can result in unauthorized access to sensitive data, disruption of services, installation of malicious software, and potential lateral movement within the network. Because the exploit requires no user interaction and has low complexity, it poses a high risk to affected environments. [1, 2, 3]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

Detection involves verifying the presence of the vulnerable endpoints and testing for SQL injection and command injection vulnerabilities. For example, you can test the SQL injection at the '/api/common/1.0/login' endpoint by sending crafted payloads that attempt to create a new user via SQL injection. For command injection, you can send POST requests to '/index.php?page=licenses' with commands like 'id' and check if the response contains user ID information (e.g., 'uid='). Specific commands include using curl or similar tools to send these crafted requests and observe responses. Additionally, monitoring for unexpected new user accounts or suspicious commands executed on the appliance may indicate exploitation attempts. [2, 3]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include restricting access to the vulnerable endpoints ('/api/common/1.0/login' and '/index.php?page=licenses') by network segmentation or firewall rules, applying any available patches or updates from Riverbed for version 10.8.7, disabling or restricting the 'mazu' user and reviewing sudoers configurations to prevent privilege escalation, and monitoring for suspicious activity such as unauthorized user creation or command execution. If patching is not immediately possible, consider disabling the affected services or endpoints to prevent exploitation. [1, 2, 3]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart