CVE-2025-63292: n/a
Freebox v5 HD (firmware = 1.7.20), Freebox v5 Crystal (firmware = 1.7.20), Freebox v6 Révolution r1–r3 (firmware = 4.7.x), Freebox Mini 4K (firmware = 4.7.x), and Freebox One (firmware = 4.7.x) were discovered to expose subscribers' IMSI identifiers in plaintext during the initial phase of EAP-SIM authentication over the `FreeWifi_secure` network. During the EAP-Response/Identity exchange, the subscriber's full Network Access Identifier (NAI), which embeds the raw IMSI, is transmitted without encryption, tunneling, or pseudonymization. An attacker located within Wi-Fi range (~100 meters) can passively capture these frames without requiring user interaction or elevated privileges. The disclosed IMSI enables device tracking, subscriber correlation, and long-term monitoring of user presence near any broadcasting Freebox device. The vendor acknowledged the vulnerability, and the `FreeWifi_secure` service is planned for full deactivation by 1 October 2025.
AI Analysis
Technical Summary
CVE-2025-63292 is a privacy-related vulnerability found in several Freebox models, including Freebox v5 HD, v5 Crystal, v6 Révolution r1–r3, Mini 4K, and Freebox One, running specific firmware versions (1.7.20 for v5 models and 4.7.x for others). The flaw lies in the EAP-SIM authentication process used by the FreeWifi_secure network, where during the EAP-Response/Identity phase, the subscriber's full Network Access Identifier (NAI) is transmitted in plaintext. This NAI embeds the International Mobile Subscriber Identity (IMSI), a unique identifier tied to the subscriber's SIM card. Because this data is sent without encryption, tunneling, or pseudonymization, any nearby attacker within Wi-Fi range can passively intercept these frames using standard wireless sniffing tools. The attacker does not require elevated privileges or user interaction, making exploitation straightforward. The exposed IMSI can be used for device tracking, subscriber correlation across networks, and long-term monitoring of user presence near any broadcasting Freebox device. Although this vulnerability does not directly compromise device integrity or network availability, it severely impacts subscriber privacy and location confidentiality. The vendor has acknowledged the vulnerability and plans to fully deactivate the FreeWifi_secure service by October 1, 2025, as a mitigation step. No patches or firmware updates are currently indicated, and no known exploits have been reported in the wild as of the publication date.
Potential Impact
For European organizations, especially those operating or providing services in France where Freebox devices are widely used, this vulnerability poses a significant privacy risk. The exposure of IMSI identifiers can lead to unauthorized tracking of employees, customers, or visitors using Freebox Wi-Fi networks, potentially violating GDPR and other privacy regulations. Organizations relying on Freebox devices for guest or public Wi-Fi may inadvertently expose sensitive subscriber information, undermining trust and compliance. While the vulnerability does not enable direct network intrusion or data manipulation, the ability to correlate subscriber presence and movement can facilitate targeted surveillance or profiling. This risk is particularly acute for organizations in sectors requiring strong privacy protections, such as healthcare, finance, and government. Additionally, the passive nature of the attack and lack of required user interaction make detection difficult, increasing the likelihood of unnoticed privacy breaches. The planned deactivation of the FreeWifi_secure service mitigates future risk but does not address existing exposures until that date.
Mitigation Recommendations
European organizations using affected Freebox models should immediately disable or avoid using the FreeWifi_secure network to prevent IMSI exposure. Network administrators should monitor for unauthorized Wi-Fi sniffing activity in sensitive areas and consider deploying wireless intrusion detection systems (WIDS) to detect passive reconnaissance attempts. Where possible, replace affected Freebox devices with models or firmware versions that do not expose IMSI or use alternative secure Wi-Fi authentication methods that employ encryption and pseudonymization of subscriber identifiers. Organizations should also inform users about the privacy risks and encourage the use of VPNs or other encrypted communication channels when connecting to FreeWifi_secure or similar networks. Since the vendor plans to deactivate the vulnerable service by October 1, 2025, organizations should plan for this transition and verify that no residual services expose subscriber information. Finally, compliance teams should review privacy policies and ensure that any data collection or monitoring complies with GDPR and local regulations, documenting mitigation efforts and risk assessments.
Affected Countries
France
CVE-2025-63292: n/a
Description
Freebox v5 HD (firmware = 1.7.20), Freebox v5 Crystal (firmware = 1.7.20), Freebox v6 Révolution r1–r3 (firmware = 4.7.x), Freebox Mini 4K (firmware = 4.7.x), and Freebox One (firmware = 4.7.x) were discovered to expose subscribers' IMSI identifiers in plaintext during the initial phase of EAP-SIM authentication over the `FreeWifi_secure` network. During the EAP-Response/Identity exchange, the subscriber's full Network Access Identifier (NAI), which embeds the raw IMSI, is transmitted without encryption, tunneling, or pseudonymization. An attacker located within Wi-Fi range (~100 meters) can passively capture these frames without requiring user interaction or elevated privileges. The disclosed IMSI enables device tracking, subscriber correlation, and long-term monitoring of user presence near any broadcasting Freebox device. The vendor acknowledged the vulnerability, and the `FreeWifi_secure` service is planned for full deactivation by 1 October 2025.
AI-Powered Analysis
Technical Analysis
CVE-2025-63292 is a privacy-related vulnerability found in several Freebox models, including Freebox v5 HD, v5 Crystal, v6 Révolution r1–r3, Mini 4K, and Freebox One, running specific firmware versions (1.7.20 for v5 models and 4.7.x for others). The flaw lies in the EAP-SIM authentication process used by the FreeWifi_secure network, where during the EAP-Response/Identity phase, the subscriber's full Network Access Identifier (NAI) is transmitted in plaintext. This NAI embeds the International Mobile Subscriber Identity (IMSI), a unique identifier tied to the subscriber's SIM card. Because this data is sent without encryption, tunneling, or pseudonymization, any nearby attacker within Wi-Fi range can passively intercept these frames using standard wireless sniffing tools. The attacker does not require elevated privileges or user interaction, making exploitation straightforward. The exposed IMSI can be used for device tracking, subscriber correlation across networks, and long-term monitoring of user presence near any broadcasting Freebox device. Although this vulnerability does not directly compromise device integrity or network availability, it severely impacts subscriber privacy and location confidentiality. The vendor has acknowledged the vulnerability and plans to fully deactivate the FreeWifi_secure service by October 1, 2025, as a mitigation step. No patches or firmware updates are currently indicated, and no known exploits have been reported in the wild as of the publication date.
Potential Impact
For European organizations, especially those operating or providing services in France where Freebox devices are widely used, this vulnerability poses a significant privacy risk. The exposure of IMSI identifiers can lead to unauthorized tracking of employees, customers, or visitors using Freebox Wi-Fi networks, potentially violating GDPR and other privacy regulations. Organizations relying on Freebox devices for guest or public Wi-Fi may inadvertently expose sensitive subscriber information, undermining trust and compliance. While the vulnerability does not enable direct network intrusion or data manipulation, the ability to correlate subscriber presence and movement can facilitate targeted surveillance or profiling. This risk is particularly acute for organizations in sectors requiring strong privacy protections, such as healthcare, finance, and government. Additionally, the passive nature of the attack and lack of required user interaction make detection difficult, increasing the likelihood of unnoticed privacy breaches. The planned deactivation of the FreeWifi_secure service mitigates future risk but does not address existing exposures until that date.
Mitigation Recommendations
European organizations using affected Freebox models should immediately disable or avoid using the FreeWifi_secure network to prevent IMSI exposure. Network administrators should monitor for unauthorized Wi-Fi sniffing activity in sensitive areas and consider deploying wireless intrusion detection systems (WIDS) to detect passive reconnaissance attempts. Where possible, replace affected Freebox devices with models or firmware versions that do not expose IMSI or use alternative secure Wi-Fi authentication methods that employ encryption and pseudonymization of subscriber identifiers. Organizations should also inform users about the privacy risks and encourage the use of VPNs or other encrypted communication channels when connecting to FreeWifi_secure or similar networks. Since the vendor plans to deactivate the vulnerable service by October 1, 2025, organizations should plan for this transition and verify that no residual services expose subscriber information. Finally, compliance teams should review privacy policies and ensure that any data collection or monitoring complies with GDPR and local regulations, documenting mitigation efforts and risk assessments.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2025-10-27T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 691b68f8f84694138ddb8359
Added to database: 11/17/2025, 6:27:04 PM
Last enriched: 11/17/2025, 6:27:51 PM
Last updated: 11/19/2025, 8:24:21 AM
Views: 28
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-13206: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in stellarwp GiveWP – Donation Plugin and Fundraising Platform
HighCVE-2025-13035: CWE-94 Improper Control of Generation of Code ('Code Injection') in codesnippetspro Code Snippets
HighCVE-2025-12484: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in smub Giveaways and Contests by RafflePress – Get More Website Traffic, Email Subscribers, and Social Followers
HighCVE-2025-13085: CWE-285 Improper Authorization in softaculous SiteSEO – SEO Simplified
MediumCVE-2025-12535: CWE-352 Cross-Site Request Forgery (CSRF) in brainstormforce SureForms – Contact Form, Custom Form Builder, Calculator & More
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.