CVE-2025-6807
BaseFortify
Publication date: 2025-07-07
Last updated on: 2025-07-14
Assigner: Zero Day Initiative
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| marvell | qconvergeconsole | to 5.5.0.85 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-22 | The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a directory traversal information disclosure flaw in Marvell's QConvergeConsole, specifically in the getDriverTmpPath method. It occurs because the software does not properly validate user-supplied paths before using them in file operations. This allows remote attackers to access sensitive information without needing to authenticate, and the attack runs with SYSTEM-level privileges. [1]
How can this vulnerability impact me? :
An attacker can remotely exploit this vulnerability to disclose sensitive information from the affected system with SYSTEM-level privileges, potentially exposing confidential data. Since no authentication is required, the risk of unauthorized data exposure is significant. However, the vulnerability does not allow modification or disruption of data or services. [1]
What immediate steps should I take to mitigate this vulnerability?
The vendor has declared the product as End of Life and End of Support and does not provide any mitigation. Therefore, immediate steps include discontinuing use of Marvell QConvergeConsole and removing it from your environment to prevent exploitation. [1]