EUVD-2025-21035

| CVE-2025-34098 HIGH
2025-07-10 [email protected]
7.1
CVSS 4.0
Share

CVSS Vector

CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None

Lifecycle Timeline

4
Analysis Generated
Mar 16, 2026 - 06:52 vuln.today
EUVD ID Assigned
Mar 16, 2026 - 06:52 euvd
EUVD-2025-21035
PoC Detected
Jul 15, 2025 - 13:14 vuln.today
Public exploit code
CVE Published
Jul 10, 2025 - 20:15 nvd
HIGH 7.1

Description

A path traversal vulnerability exists in Riverbed SteelHead VCX appliances (confirmed in VCX255U 9.6.0a) due to improper input validation in the log filtering functionality exposed via the management web interface. An authenticated attacker can exploit this flaw by submitting crafted filter expressions to the log_filter endpoint using the filterStr parameter. This input is processed by a backend parser that permits execution of file expansion syntax, allowing the attacker to retrieve arbitrary system files via the log viewing interface.

Analysis

A path traversal vulnerability in Riverbed SteelHead VCX appliances allows authenticated users to retrieve arbitrary system files through improper input validation in the log filtering functionality. The vulnerability affects VCX255U running version 9.6.0a and potentially other VCX models, enabling authenticated attackers to bypass access controls and read sensitive system files via crafted filter expressions. With a CVSS score of 7.1 and authentication requirement, this represents a significant confidentiality risk for organizations running affected appliances, though exploitation requires valid credentials.

Technical Context

The vulnerability resides in the log_filter endpoint of Riverbed SteelHead VCX's management web interface, which accepts a 'filterStr' parameter for log filtering operations. The backend parser improperly processes user-supplied input without adequate validation, allowing shell-style file expansion syntax (glob patterns, variable expansion, or similar metacharacters) to be interpreted. This is classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor), indicating the root cause is insufficient input sanitization in a security-critical code path. The affected product line is Riverbed SteelHead VCX (CPE: vendor:riverbed, product:steelhead_vcx), specifically confirmed in model VCX255U version 9.6.0a. The vulnerability exploits the difference between what the application intends (log filtering) and what the parser executes (file system traversal via expansion syntax).

Affected Products

SteelHead VCX (['9.6.0a'])

Priority Score

97
Low Medium High Critical
KEV: 0
EPSS: +41.4
CVSS: +36
POC: +20

Share

EUVD-2025-21035 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy