CVE-2025-6794

Marvell · Marvell QConvergeConsole Storage Management

A critical vulnerability has been discovered in Marvell QConvergeConsole Storage Management software, identified as CVE-2025-6794.

Executive summary

A critical vulnerability has been discovered in Marvell QConvergeConsole Storage Management software, identified as CVE-2025-6794. This flaw allows a remote, unauthenticated attacker to execute arbitrary code on the affected system by exploiting a directory traversal weakness. Successful exploitation could lead to a complete compromise of the storage management server, potentially resulting in significant data breaches, service disruption, and unauthorized access to the broader network.

Vulnerability

The vulnerability exists within the saveAsText function of the QConvergeConsole software. This function fails to properly sanitize user-supplied input for directory traversal sequences (e.g., ../). A remote attacker can craft a malicious request to this function, specifying a path that navigates outside of the intended storage directory. By writing a malicious file (such as a script or web shell) to a sensitive location on the server (e.g., a web root, system binary path, or a scheduled task directory), the attacker can achieve arbitrary code execution with the privileges of the QConvergeConsole service account.

Business impact

This vulnerability is rated as critical severity with a CVSS score of 9.8, reflecting the ease of exploitation and the potential for complete system compromise. As QConvergeConsole is used to manage critical storage infrastructure, a successful attack could have severe consequences, including theft or ransoming of sensitive corporate data, destruction of backups, and widespread operational outages. The compromised server could also be used as a pivot point for attackers to move laterally within the organization's network, escalating the scope of the breach and impacting other critical systems.

Remediation

Immediate Action:

  • Patch: Apply the security update provided by Marvell to all affected installations immediately. This is the most effective method of remediation.
  • Restrict Access: If patching cannot be performed instantly, restrict all network access to the QConvergeConsole management interfaces. Use firewalls or network access control lists (ACLs) to ensure that only trusted administrators on a dedicated management network can reach the interface.
  • Monitor: Begin actively monitoring for signs of compromise, focusing on suspicious file creation or modification in system-critical directories.

Proactive Monitoring:

  • Log Analysis: Scrutinize application and system logs for any file write operations initiated by the QConvergeConsole process that contain path traversal characters (../).
  • File Integrity Monitoring (FIM): Implement or enhance FIM on affected servers to generate alerts for any unauthorized changes or file creation in sensitive directories (e.g., /etc/, /var/www/, /bin, /usr/bin).
  • Network Traffic Analysis: Monitor network traffic to the management interface for unusual requests, especially those containing file paths in parameters sent to the saveAsText function or similar endpoints.

Compensating Controls:

  • Network Segmentation: Isolate the server hosting QConvergeConsole in a highly restricted network segment, separate from user and other production server networks.
  • Intrusion Prevention System (IPS): Deploy an IPS with rulesets designed to detect and block common directory traversal attack patterns at the network perimeter or in front of the affected server.
  • Principle of Least Privilege: Ensure the service account running the QConvergeConsole application has the minimum necessary permissions on the underlying operating system to limit the impact of a potential code execution event.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Due to the critical CVSS score of 9.8 and the risk of complete system compromise, this vulnerability requires immediate attention. We strongly recommend that all organizations using Marvell QConvergeConsole prioritize the deployment of the vendor-supplied patch as the primary remediation step. If patching is delayed for any reason, the compensating controls, particularly strict network access restriction, must be implemented without delay to reduce the attack surface. Treat this vulnerability with the highest urgency, as it is a prime candidate for widespread exploitation.