Path traversal may allow remote code execution using privileged account
(requires device admin account, cannot be performed by a regular user).
In combination with the 'Upload' functionality this could be used to
execute an arbitrary script or possibly an uploaded binary. Remediation
in Version 6.7.0, release date: 20-Oct-24.
Advisories
Source ID Title
EUVD EUVD EUVD-2025-6177 Path traversal may allow remote code execution using privileged account (requires device admin account, cannot be performed by a regular user). In combination with the 'Upload' functionality this could be used to execute an arbitrary script or possibly an uploaded binary. Remediation in Version 6.7.0, release date: 20-Oct-24.
Fixes

Solution

Keysight recommends that all users upgrade to the latest version of software as soon as possible. https://support.ixiacom.com/support-overview/product-support/downloads-updates Remediation in Version 6.7.0, release date: 20-Oct-24.  Older versions of this software may have this vulnerability; Keysight recommends that users discontinue the use of older software versions. For more information about the Ixia Vision Product Family, please visit Ixia product support https://support.ixiacom.com/ Further questions can be answered by contacting Keysight. https://www.keysight.com/us/en/contact.html


Workaround

No workaround given by the vendor.

History

Wed, 05 Mar 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 05 Mar 2025 15:30:00 +0000

Type Values Removed Values Added
Description Path traversal may allow remote code execution using privileged account (requires device admin account, cannot be performed by a regular user). In combination with the 'Upload' functionality this could be used to execute an arbitrary script or possibly an uploaded binary. Remediation in Version 6.7.0, release date: 20-Oct-24.
Title Keysight Ixia Vision Product Family Path Traversal
Weaknesses CWE-22
References
Metrics cvssV3_1

{'score': 7.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 8.6, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2025-03-05T16:09:05.368Z

Reserved: 2025-02-05T15:36:40.967Z

Link: CVE-2025-24494

cve-icon Vulnrichment

Updated: 2025-03-05T16:09:01.382Z

cve-icon NVD

Status : Received

Published: 2025-03-05T16:15:38.937

Modified: 2025-03-05T16:15:38.937

Link: CVE-2025-24494

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.