Home

Description

Radiometrics VizAir is vulnerable to exposure of the system's REST API key through a publicly accessible configuration file. This allows attackers to remotely alter weather data and configurations, automate attacks against multiple instances, and extract sensitive meteorological data, which could potentially compromise airport operations. Additionally, attackers could flood the system with false alerts, leading to a denial-of-service condition and significant disruption to airport operations. Unauthorized remote control over aviation weather monitoring and data manipulation could result in incorrect flight planning and hazardous takeoff and landing conditions.

PUBLISHED Reserved 2025-10-07 | Published 2025-11-04 | Updated 2025-11-04 | Assigner icscert




CRITICAL: 10.0CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H

CRITICAL: 10.0CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

Problem types

CWE-522 Insufficiently Protected Credentials

Product status

Default status
unaffected

Any version before 08/2025
affected

Credits

Souvik Kandar reporter

References

www.cisa.gov/news-events/ics-advisories/icsa-25-308-04

github.com/...p/csaf_files/OT/white/2025/icsa-25-308-04.json

cve.org (CVE-2025-54863)

nvd.nist.gov (CVE-2025-54863)

Download JSON