Metrics
Affected Vendors & Products
Solution
Optigo Networks recommends users to upgrade to the following: * Visual BACnet Capture Tool: Version v3.1.3rc8 https://optigo.zendesk.com/hc/en-us/sections/360011386412-Capture-Tool-Software-Visual-BACnet * Optigo Visual Networks Capture Tool: Version v3.1.3rc8 https://optigo.zendesk.com/hc/en-us/sections/20125604316813-Capture-Tool-Software-Optigo-Visual-Networks
Workaround
No workaround given by the vendor.
Sun, 13 Jul 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
epss
|
epss
|
Thu, 13 Mar 2025 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Thu, 13 Mar 2025 17:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Optigo Networks Visual BACnet Capture Tool and Optigo Visual Networks Capture Tool version 3.1.2rc11 contain a hard coded secret key. This could allow an attacker to generate valid JWT (JSON Web Token) sessions. | |
Weaknesses | CWE-547 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2025-03-13T18:49:46.725Z
Reserved: 2025-03-06T22:01:46.732Z
Link: CVE-2025-2079

Updated: 2025-03-13T18:49:42.633Z

Status : Received
Published: 2025-03-13T17:15:38.080
Modified: 2025-03-13T17:15:38.080
Link: CVE-2025-2079

No data.

No data.