CVE-2025-54863

Radiometrics VizAir is vulnerable to exposure of the system's REST API key through a publicly accessible configuration file. This allows attackers to remotely alter weather data and configurations, automate attacks against multiple instances, and extract sensitive meteorological data, which could potentially compromise airport operations. Additionally, attackers could flood the system with false alerts, leading to a denial-of-service condition and significant disruption to airport operations. Unauthorized remote control over aviation weather monitoring and data manipulation could result in incorrect flight planning and hazardous takeoff and landing conditions.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:radiometrics:vizair:*:*:*:*:*:*:*:*

History

12 Nov 2025, 14:13

Type Values Removed Values Added
First Time Radiometrics vizair
Radiometrics
CPE cpe:2.3:a:radiometrics:vizair:*:*:*:*:*:*:*:*
References () https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2025/icsa-25-308-04.json - () https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2025/icsa-25-308-04.json - Third Party Advisory
References () https://www.cisa.gov/news-events/ics-advisories/icsa-25-308-04 - () https://www.cisa.gov/news-events/ics-advisories/icsa-25-308-04 - Mitigation, Third Party Advisory, US Government Resource

04 Nov 2025, 17:16

Type Values Removed Values Added
New CVE

Information

Published : 2025-11-04 17:16

Updated : 2025-11-12 14:13


NVD link : CVE-2025-54863

Mitre link : CVE-2025-54863

CVE.ORG link : CVE-2025-54863


JSON object : View

Products Affected

radiometrics

  • vizair
CWE
CWE-522

Insufficiently Protected Credentials