CVE-2025-63292: n/a
Freebox v5 HD (firmware = 1.7.20), Freebox v5 Crystal (firmware = 1.7.20), Freebox v6 Révolution r1–r3 (firmware = 4.7.x), Freebox Mini 4K (firmware = 4.7.x), and Freebox One (firmware = 4.7.x) were discovered to expose subscribers' IMSI identifiers in plaintext during the initial phase of EAP-SIM authentication over the `FreeWifi_secure` network. During the EAP-Response/Identity exchange, the subscriber's full Network Access Identifier (NAI), which embeds the raw IMSI, is transmitted without encryption, tunneling, or pseudonymization. An attacker located within Wi-Fi range (~100 meters) can passively capture these frames without requiring user interaction or elevated privileges. The disclosed IMSI enables device tracking, subscriber correlation, and long-term monitoring of user presence near any broadcasting Freebox device. The vendor acknowledged the vulnerability, and the `FreeWifi_secure` service is planned for full deactivation by 1 October 2025.
AI Analysis
Technical Summary
CVE-2025-63292 is a vulnerability identified in several Freebox models, including Freebox v5 HD, v5 Crystal, v6 Révolution (r1–r3), Mini 4K, and Freebox One, running specific firmware versions (1.7.20 for v5 models and 4.7.x for others). The issue arises during the initial phase of EAP-SIM authentication over the FreeWifi_secure network, where the subscriber’s IMSI (International Mobile Subscriber Identity) is transmitted in plaintext embedded within the Network Access Identifier (NAI) during the EAP-Response/Identity exchange. This transmission lacks encryption, tunneling, or pseudonymization, violating confidentiality principles. An attacker within approximately 100 meters can passively capture these frames without requiring elevated privileges or user interaction, enabling them to obtain the IMSI. The IMSI is a unique identifier that can be used for device tracking, correlating subscriber activity, and long-term monitoring of user presence near any broadcasting Freebox device. The vulnerability is classified under CWE-319 (Cleartext Transmission of Sensitive Information). The vendor has acknowledged the issue and plans to fully deactivate the FreeWifi_secure service by October 1, 2025, as a remediation step. The CVSS v3.1 score is 3.5 (low severity), reflecting limited confidentiality impact and no impact on integrity or availability, with attack vector being adjacent network, no privileges required, and user interaction needed. No known exploits are currently in the wild.
Potential Impact
For European organizations, particularly those in France where Freebox devices are widely used, this vulnerability poses a privacy risk rather than a direct threat to network security or system integrity. The exposure of IMSI in plaintext allows attackers to passively track and correlate subscriber presence and movement over time, potentially enabling profiling or surveillance of individuals. This could be exploited by malicious actors interested in physical tracking or targeted reconnaissance. While the vulnerability does not allow direct compromise of devices or networks, the loss of subscriber privacy could have regulatory implications under GDPR and damage user trust. Organizations relying on Freebox devices for Wi-Fi access should be aware of the potential for passive IMSI interception in public or semi-public environments. The risk is lower for organizations outside France due to limited Freebox deployment. Since the vulnerability requires proximity and passive sniffing, it is less likely to be exploited remotely or at scale but remains a concern for privacy-sensitive environments.
Mitigation Recommendations
1. Disable or avoid using the FreeWifi_secure network on affected Freebox devices until the vendor deactivates the service by October 2025. 2. Encourage users to connect via alternative secure Wi-Fi networks that do not expose IMSI or use stronger authentication methods. 3. Monitor Wi-Fi environments for unauthorized passive sniffing devices or unusual reconnaissance activity near organizational premises. 4. Educate users about the privacy risks of connecting to FreeWifi_secure and recommend disabling automatic connections to this network. 5. For organizations managing Freebox devices, consider firmware updates if available or network segmentation to limit exposure. 6. Implement network access controls and logging to detect anomalous authentication attempts or repeated identity exchanges. 7. Engage with the vendor for updates on remediation timelines and potential patches. 8. Review privacy policies and compliance measures to address potential GDPR concerns related to IMSI exposure.
Affected Countries
France
CVE-2025-63292: n/a
Description
Freebox v5 HD (firmware = 1.7.20), Freebox v5 Crystal (firmware = 1.7.20), Freebox v6 Révolution r1–r3 (firmware = 4.7.x), Freebox Mini 4K (firmware = 4.7.x), and Freebox One (firmware = 4.7.x) were discovered to expose subscribers' IMSI identifiers in plaintext during the initial phase of EAP-SIM authentication over the `FreeWifi_secure` network. During the EAP-Response/Identity exchange, the subscriber's full Network Access Identifier (NAI), which embeds the raw IMSI, is transmitted without encryption, tunneling, or pseudonymization. An attacker located within Wi-Fi range (~100 meters) can passively capture these frames without requiring user interaction or elevated privileges. The disclosed IMSI enables device tracking, subscriber correlation, and long-term monitoring of user presence near any broadcasting Freebox device. The vendor acknowledged the vulnerability, and the `FreeWifi_secure` service is planned for full deactivation by 1 October 2025.
AI-Powered Analysis
Technical Analysis
CVE-2025-63292 is a vulnerability identified in several Freebox models, including Freebox v5 HD, v5 Crystal, v6 Révolution (r1–r3), Mini 4K, and Freebox One, running specific firmware versions (1.7.20 for v5 models and 4.7.x for others). The issue arises during the initial phase of EAP-SIM authentication over the FreeWifi_secure network, where the subscriber’s IMSI (International Mobile Subscriber Identity) is transmitted in plaintext embedded within the Network Access Identifier (NAI) during the EAP-Response/Identity exchange. This transmission lacks encryption, tunneling, or pseudonymization, violating confidentiality principles. An attacker within approximately 100 meters can passively capture these frames without requiring elevated privileges or user interaction, enabling them to obtain the IMSI. The IMSI is a unique identifier that can be used for device tracking, correlating subscriber activity, and long-term monitoring of user presence near any broadcasting Freebox device. The vulnerability is classified under CWE-319 (Cleartext Transmission of Sensitive Information). The vendor has acknowledged the issue and plans to fully deactivate the FreeWifi_secure service by October 1, 2025, as a remediation step. The CVSS v3.1 score is 3.5 (low severity), reflecting limited confidentiality impact and no impact on integrity or availability, with attack vector being adjacent network, no privileges required, and user interaction needed. No known exploits are currently in the wild.
Potential Impact
For European organizations, particularly those in France where Freebox devices are widely used, this vulnerability poses a privacy risk rather than a direct threat to network security or system integrity. The exposure of IMSI in plaintext allows attackers to passively track and correlate subscriber presence and movement over time, potentially enabling profiling or surveillance of individuals. This could be exploited by malicious actors interested in physical tracking or targeted reconnaissance. While the vulnerability does not allow direct compromise of devices or networks, the loss of subscriber privacy could have regulatory implications under GDPR and damage user trust. Organizations relying on Freebox devices for Wi-Fi access should be aware of the potential for passive IMSI interception in public or semi-public environments. The risk is lower for organizations outside France due to limited Freebox deployment. Since the vulnerability requires proximity and passive sniffing, it is less likely to be exploited remotely or at scale but remains a concern for privacy-sensitive environments.
Mitigation Recommendations
1. Disable or avoid using the FreeWifi_secure network on affected Freebox devices until the vendor deactivates the service by October 2025. 2. Encourage users to connect via alternative secure Wi-Fi networks that do not expose IMSI or use stronger authentication methods. 3. Monitor Wi-Fi environments for unauthorized passive sniffing devices or unusual reconnaissance activity near organizational premises. 4. Educate users about the privacy risks of connecting to FreeWifi_secure and recommend disabling automatic connections to this network. 5. For organizations managing Freebox devices, consider firmware updates if available or network segmentation to limit exposure. 6. Implement network access controls and logging to detect anomalous authentication attempts or repeated identity exchanges. 7. Engage with the vendor for updates on remediation timelines and potential patches. 8. Review privacy policies and compliance measures to address potential GDPR concerns related to IMSI exposure.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2025-10-27T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 691b68f8f84694138ddb8359
Added to database: 11/17/2025, 6:27:04 PM
Last enriched: 11/24/2025, 7:22:34 PM
Last updated: 1/7/2026, 4:16:57 AM
Views: 72
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-20893: Origin validation error in Fujitsu Client Computing Limited Fujitsu Security Solution AuthConductor Client Basic V2
HighCVE-2025-14891: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ivole Customer Reviews for WooCommerce
MediumCVE-2025-14059: CWE-73 External Control of File Name or Path in roxnor EmailKit – Email Customizer for WooCommerce & WP
MediumCVE-2025-12648: CWE-552 Files or Directories Accessible to External Parties in cbutlerjr WP-Members Membership Plugin
MediumCVE-2025-14631: CWE-476 NULL Pointer Dereference in TP-Link Systems Inc. Archer BE400
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.