RAD SecFlow-2 Vulnerability: Path Traversal Exploit Hits Critical Infrastructure
RAD SecFlow-2 devices are vulnerable to path traversal attacks, allowing attackers to access sensitive files. With a CVSS v4 score of 8.7, this flaw poses a serious remote threat. RAD recommends upgrading to SecFlow-1p and following CISA’s cybersecurity measures for protection.

Hot Take:
Well, SecFlow-2 sure knows how to make an exit! With a vulnerability that practically leaves the door open for hackers, it’s no wonder RAD Data Communications is recommending an upgrade. Out with the old and easily exploitable, in with the new and secure – at least, we hope.
Key Points:
- Vulnerability: Path Traversal in SecFlow-2 with CVSS v4 score of 8.7
- Attack Complexity: Low, with available public exploits
- Affected Product: RAD Data Communications SecFlow-2, all versions
- Potential Impact: Obtain files from the operating system
- Mitigation: Upgrade to SecFlow-1p and follow CISA recommendations
Already a member? Log in here