Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-61945: CWE-306 Missing Authentication for Critical Function in Radiometrics VizAir

0
Critical
VulnerabilityCVE-2025-61945cvecve-2025-61945cwe-306
Published: Tue Nov 04 2025 (11/04/2025, 16:10:49 UTC)
Source: CVE Database V5
Vendor/Project: Radiometrics
Product: VizAir

Description

Radiometrics VizAir is vulnerable to any remote attacker via access to the admin panel of the VizAir system without authentication. Once inside, the attacker can modify critical weather parameters such as wind shear alerts, inversion depth, and CAPE values, which are essential for accurate weather forecasting and flight safety. This unauthorized access could result in the disabling of vital alerts, causing hazardous conditions for aircraft, and manipulating runway assignments, which could result in mid-air conflicts or runway incursions.

AI-Powered Analysis

AILast updated: 11/11/2025, 18:24:50 UTC

Technical Analysis

CVE-2025-61945 is a critical security vulnerability identified in Radiometrics VizAir, a system used for weather monitoring and forecasting, particularly in aviation contexts. The vulnerability arises from a missing authentication mechanism (CWE-306) on the admin panel of the VizAir system, allowing any remote attacker to gain unauthorized access without credentials. Once inside the admin interface, the attacker can alter critical weather parameters such as wind shear alerts, inversion depth, and Convective Available Potential Energy (CAPE) values. These parameters are essential for accurate weather forecasting and directly impact flight safety by informing pilots and air traffic controllers about hazardous conditions. Manipulating these values can disable vital alerts, leading to unsafe flight conditions, and can also affect runway assignments, increasing the risk of mid-air collisions or runway incursions. The vulnerability is remotely exploitable over the network without any authentication or user interaction, making it highly dangerous. The CVSS 4.0 score of 10.0 reflects the highest severity, with high impact on confidentiality, integrity, and availability of the system. No patches or mitigations have been published yet, and while no exploits are currently known in the wild, the potential for severe consequences in aviation safety is significant. The vulnerability was published on November 4, 2025, and is tracked under CWE-306 (Missing Authentication for Critical Function).

Potential Impact

For European organizations, especially those involved in aviation, meteorology, and air traffic control, this vulnerability poses a severe risk. Unauthorized manipulation of weather data and alerts can lead to incorrect flight decisions, increasing the likelihood of accidents, runway incursions, and mid-air collisions. The integrity and availability of critical weather information are compromised, potentially endangering passenger safety and causing operational disruptions. Aviation authorities and airports relying on VizAir for weather monitoring could face regulatory scrutiny and liability issues if exploited. Additionally, disruption of accurate weather forecasting can affect broader public safety and emergency response efforts. The potential cascading effects on air traffic management and airport operations could result in significant economic and reputational damage across European aviation sectors.

Mitigation Recommendations

Given the absence of an official patch, European organizations should immediately implement network-level access controls to restrict access to the VizAir admin panel. This includes isolating the system within a secure network segment, applying strict firewall rules, and using VPNs or zero-trust network access solutions to limit exposure. Continuous monitoring and logging of all access attempts to the admin interface should be established to detect unauthorized activity promptly. Organizations should conduct thorough audits of current configurations and remove any unnecessary remote access capabilities. Where possible, implement compensating controls such as multi-factor authentication proxies or web application firewalls (WAFs) to enforce authentication externally. Coordination with Radiometrics for timely updates and patches is critical, and organizations should prepare for rapid deployment once available. Additionally, contingency plans for manual verification of weather data and alerts should be developed to mitigate risks during the vulnerability window.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
icscert
Date Reserved
2025-10-07T19:42:54.137Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 690a2ddcf0ba78a050535a8c

Added to database: 11/4/2025, 4:46:20 PM

Last enriched: 11/11/2025, 6:24:50 PM

Last updated: 12/20/2025, 5:14:04 PM

Views: 49

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats