CVE-2025-62878
HP · HP Multiple Products
A parameter manipulation vulnerability in HP products allows users to create PersistentVolumes in unauthorized locations, leading to host file overwrites.
Executive summary
A critical vulnerability in HP software allows malicious users to manipulate volume creation paths, potentially overwriting sensitive host files and gaining unauthorized system access.
Vulnerability
A malicious user can manipulate the parameters.pathPattern variable during volume configuration. This allows for the creation of PersistentVolumes in arbitrary locations on the host node, bypassing intended directory restrictions and enabling the overwriting of sensitive system files.
Business impact
The ability to overwrite host-level files can lead to a complete compromise of the affected node, including privilege escalation and the disruption of critical services. This could result in system downtime and the loss of data integrity across the infrastructure. The CVSS score of 9.9 highlights the extreme risk associated with such an unauthorized file system access flaw.
Remediation
Immediate Action: Apply the latest security updates provided by HP for all affected storage and orchestration products immediately.
Proactive Monitoring: Audit host file systems for unexpected volume mounts and monitor container orchestration logs for unauthorized changes to PersistentVolume specifications.
Compensating Controls: Implement Pod Security Admissions or similar policies to restrict the types of volumes that can be mounted and prevent the use of host paths by non-privileged users.
Exploitation status
Public Exploit Available: false
Analyst recommendation
This vulnerability poses a significant threat to host security and container isolation. It is essential to apply the vendor-supplied patches immediately to prevent unauthorized users from gaining control over the underlying infrastructure.