CVE-2025-24525
BaseFortify
Publication date: 2025-09-30
Last updated on: 2025-10-02
Assigner: ICS-CERT
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| keysight | ixia_vision | 6.9.1 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-321 | The product uses a hard-coded, unchangeable cryptographic key. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in Keysight Ixia Vision involves hardcoded cryptographic material. If the end user does not replace the TLS certificate that ships with the device, an attacker may be able to intercept or decrypt data sent to the device via API calls or user authentication.
How can this vulnerability impact me? :
The vulnerability can allow an attacker to intercept or decrypt sensitive information transmitted to the device, potentially compromising confidentiality of API calls and user authentication data.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, immediately replace the TLS certificate that shipped with the Keysight Ixia Vision device with a new, secure certificate. Additionally, upgrade the device firmware to Version 6.9.1 or later, which contains the remediation for this issue.