Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-63292: n/a

0
Low
VulnerabilityCVE-2025-63292cvecve-2025-63292
Published: Mon Nov 17 2025 (11/17/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

Freebox v5 HD (firmware = 1.7.20), Freebox v5 Crystal (firmware = 1.7.20), Freebox v6 Révolution r1–r3 (firmware = 4.7.x), Freebox Mini 4K (firmware = 4.7.x), and Freebox One (firmware = 4.7.x) were discovered to expose subscribers' IMSI identifiers in plaintext during the initial phase of EAP-SIM authentication over the `FreeWifi_secure` network. During the EAP-Response/Identity exchange, the subscriber's full Network Access Identifier (NAI), which embeds the raw IMSI, is transmitted without encryption, tunneling, or pseudonymization. An attacker located within Wi-Fi range (~100 meters) can passively capture these frames without requiring user interaction or elevated privileges. The disclosed IMSI enables device tracking, subscriber correlation, and long-term monitoring of user presence near any broadcasting Freebox device. The vendor acknowledged the vulnerability, and the `FreeWifi_secure` service is planned for full deactivation by 1 October 2025.

AI-Powered Analysis

AILast updated: 11/17/2025, 18:27:51 UTC

Technical Analysis

CVE-2025-63292 is a privacy-related vulnerability found in several Freebox models, including Freebox v5 HD, v5 Crystal, v6 Révolution r1–r3, Mini 4K, and Freebox One, running specific firmware versions (1.7.20 for v5 models and 4.7.x for others). The flaw lies in the EAP-SIM authentication process used by the FreeWifi_secure network, where during the EAP-Response/Identity phase, the subscriber's full Network Access Identifier (NAI) is transmitted in plaintext. This NAI embeds the International Mobile Subscriber Identity (IMSI), a unique identifier tied to the subscriber's SIM card. Because this data is sent without encryption, tunneling, or pseudonymization, any nearby attacker within Wi-Fi range can passively intercept these frames using standard wireless sniffing tools. The attacker does not require elevated privileges or user interaction, making exploitation straightforward. The exposed IMSI can be used for device tracking, subscriber correlation across networks, and long-term monitoring of user presence near any broadcasting Freebox device. Although this vulnerability does not directly compromise device integrity or network availability, it severely impacts subscriber privacy and location confidentiality. The vendor has acknowledged the vulnerability and plans to fully deactivate the FreeWifi_secure service by October 1, 2025, as a mitigation step. No patches or firmware updates are currently indicated, and no known exploits have been reported in the wild as of the publication date.

Potential Impact

For European organizations, especially those operating or providing services in France where Freebox devices are widely used, this vulnerability poses a significant privacy risk. The exposure of IMSI identifiers can lead to unauthorized tracking of employees, customers, or visitors using Freebox Wi-Fi networks, potentially violating GDPR and other privacy regulations. Organizations relying on Freebox devices for guest or public Wi-Fi may inadvertently expose sensitive subscriber information, undermining trust and compliance. While the vulnerability does not enable direct network intrusion or data manipulation, the ability to correlate subscriber presence and movement can facilitate targeted surveillance or profiling. This risk is particularly acute for organizations in sectors requiring strong privacy protections, such as healthcare, finance, and government. Additionally, the passive nature of the attack and lack of required user interaction make detection difficult, increasing the likelihood of unnoticed privacy breaches. The planned deactivation of the FreeWifi_secure service mitigates future risk but does not address existing exposures until that date.

Mitigation Recommendations

European organizations using affected Freebox models should immediately disable or avoid using the FreeWifi_secure network to prevent IMSI exposure. Network administrators should monitor for unauthorized Wi-Fi sniffing activity in sensitive areas and consider deploying wireless intrusion detection systems (WIDS) to detect passive reconnaissance attempts. Where possible, replace affected Freebox devices with models or firmware versions that do not expose IMSI or use alternative secure Wi-Fi authentication methods that employ encryption and pseudonymization of subscriber identifiers. Organizations should also inform users about the privacy risks and encourage the use of VPNs or other encrypted communication channels when connecting to FreeWifi_secure or similar networks. Since the vendor plans to deactivate the vulnerable service by October 1, 2025, organizations should plan for this transition and verify that no residual services expose subscriber information. Finally, compliance teams should review privacy policies and ensure that any data collection or monitoring complies with GDPR and local regulations, documenting mitigation efforts and risk assessments.

Affected Countries

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-10-27T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 691b68f8f84694138ddb8359

Added to database: 11/17/2025, 6:27:04 PM

Last enriched: 11/17/2025, 6:27:51 PM

Last updated: 11/19/2025, 8:24:21 AM

Views: 28

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats