CVE-2025-12055
BaseFortify
Publication date: 2025-10-27
Last updated on: 2025-11-03
Assigner: SEC Consult Vulnerability Lab
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| mpdv | fedra_2 | * |
| mpdv | mip_2 | * |
| mpdv | hydra_x | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-22 | The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2025-12055 is an unauthenticated local file disclosure vulnerability in MPDV Mikrolab's Manufacturing Execution System products HYDRA X, MIP 2, and FEDRA 2. It affects all versions up to Maintenance Pack 36 with Servicepack 8 (week 36/2025). The vulnerability allows an attacker to read arbitrary files from the Windows operating system where the software is installed by exploiting the "Filename" parameter of the public $SCHEMAS$ resource without needing any authentication or authorization. [1]
How can this vulnerability impact me? :
This vulnerability can allow an attacker to read sensitive or critical files from the Windows operating system on the affected server without authentication. This could lead to exposure of confidential information, system configuration files, or other data that could be used to further compromise the system or network. Since the attacker does not need to authenticate, the risk of unauthorized data disclosure is significant. There is no workaround available, so applying the vendor's patch is essential to mitigate this risk. [1]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by attempting to exploit the unauthenticated local file disclosure via the vulnerable "Filename" parameter of the public $SCHEMAS$ resource. A detection command example is sending an HTTP GET request to the affected server like: GET /hx/resources/public/$SCHEMAS$?Filename=c%3a%5cwindows%5cwin.ini HTTP/1.1. If the server responds with the contents of the requested file (e.g., win.ini), the system is vulnerable. [1]
What immediate steps should I take to mitigate this vulnerability?
The immediate step to mitigate this vulnerability is to apply the patch released by the vendor in Maintenance Pack 36 (week 36/2025) for MIP 2, FEDRA 2, and HYDRA X with Servicepack 8. There is no available workaround, so patching is strongly advised. Additionally, a comprehensive security review of the product is recommended to identify any further vulnerabilities. [1]