Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-54863: CWE-522 Insufficiently Protected Credentials in Radiometrics VizAir

0
Critical
VulnerabilityCVE-2025-54863cvecve-2025-54863cwe-522
Published: Tue Nov 04 2025 (11/04/2025, 16:13:03 UTC)
Source: CVE Database V5
Vendor/Project: Radiometrics
Product: VizAir

Description

Radiometrics VizAir is vulnerable to exposure of the system's REST API key through a publicly accessible configuration file. This allows attackers to remotely alter weather data and configurations, automate attacks against multiple instances, and extract sensitive meteorological data, which could potentially compromise airport operations. Additionally, attackers could flood the system with false alerts, leading to a denial-of-service condition and significant disruption to airport operations. Unauthorized remote control over aviation weather monitoring and data manipulation could result in incorrect flight planning and hazardous takeoff and landing conditions.

AI-Powered Analysis

AILast updated: 11/04/2025, 16:48:04 UTC

Technical Analysis

CVE-2025-54863 identifies a critical security vulnerability in Radiometrics VizAir, a system used for aviation weather monitoring and data dissemination. The root cause is the insufficient protection of the system's REST API key, which is stored in a configuration file accessible publicly or without adequate access controls. This exposure allows attackers to retrieve the API key without authentication, granting them full remote access to the system's REST API. With this access, attackers can alter weather data and system configurations, potentially injecting false meteorological information that could mislead airport operations and flight planning. Additionally, attackers can automate attacks against multiple VizAir instances, amplifying the threat's scale. The vulnerability also enables attackers to flood the system with false alerts, causing denial-of-service conditions that disrupt airport operations. The impact extends to confidentiality, integrity, and availability of critical aviation weather data, posing safety risks such as hazardous takeoff and landing conditions. The vulnerability has a CVSS 4.0 score of 10.0, reflecting its critical nature with network attack vector, no required privileges or user interaction, and high impact on all security properties. No patches or public exploits are currently reported, but the vulnerability demands urgent attention due to its potential to disrupt critical infrastructure.

Potential Impact

For European organizations, particularly airports and aviation authorities relying on Radiometrics VizAir, this vulnerability poses a severe risk to operational safety and continuity. Manipulation of weather data can lead to incorrect flight planning, increasing the risk of accidents during takeoff and landing phases. Denial-of-service conditions caused by alert flooding can disrupt airport operations, causing delays and economic losses. The exposure of sensitive meteorological data also risks confidentiality breaches, potentially revealing operational details to adversaries. Given the critical role of aviation in European transport infrastructure and the high volume of air traffic, exploitation could have cascading effects on national and regional transportation networks. Furthermore, the ability to automate attacks across multiple instances increases the threat's scale, potentially affecting multiple airports simultaneously. The vulnerability could also undermine trust in aviation safety systems and regulatory compliance, leading to reputational damage and legal consequences for affected organizations.

Mitigation Recommendations

To mitigate CVE-2025-54863, European organizations should immediately audit access controls on all Radiometrics VizAir configuration files to ensure that REST API keys are not publicly accessible or exposed to unauthorized users. Implement strict file system permissions and consider encrypting sensitive configuration data at rest. Rotate all exposed API keys and enforce strong key management policies, including regular key rotation and revocation procedures. Network segmentation should be applied to isolate VizAir systems from general IT networks and the internet, limiting access to trusted management hosts only. Employ intrusion detection and anomaly monitoring to detect unusual API usage patterns or sudden surges in alert generation that could indicate exploitation attempts. Coordinate with Radiometrics for any available patches or updates and apply them promptly once released. Additionally, implement multi-factor authentication and IP whitelisting for REST API access where possible. Conduct regular security assessments and penetration testing focused on configuration management and API security to proactively identify and remediate weaknesses.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
icscert
Date Reserved
2025-10-07T19:42:54.161Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 690a2ddcf0ba78a050535a88

Added to database: 11/4/2025, 4:46:20 PM

Last enriched: 11/4/2025, 4:48:04 PM

Last updated: 11/5/2025, 4:56:52 AM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats