(requires device admin account, cannot be performed by a regular user).
In combination with the 'Upload' functionality this could be used to
execute an arbitrary script or possibly an uploaded binary. Remediation
in Version 6.7.0, release date: 20-Oct-24.
Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-6177 | Path traversal may allow remote code execution using privileged account (requires device admin account, cannot be performed by a regular user). In combination with the 'Upload' functionality this could be used to execute an arbitrary script or possibly an uploaded binary. Remediation in Version 6.7.0, release date: 20-Oct-24. |
Solution
Keysight recommends that all users upgrade to the latest version of software as soon as possible. https://support.ixiacom.com/support-overview/product-support/downloads-updates Remediation in Version 6.7.0, release date: 20-Oct-24. Older versions of this software may have this vulnerability; Keysight recommends that users discontinue the use of older software versions. For more information about the Ixia Vision Product Family, please visit Ixia product support https://support.ixiacom.com/ Further questions can be answered by contacting Keysight. https://www.keysight.com/us/en/contact.html
Workaround
No workaround given by the vendor.
Wed, 05 Mar 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 05 Mar 2025 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Path traversal may allow remote code execution using privileged account (requires device admin account, cannot be performed by a regular user). In combination with the 'Upload' functionality this could be used to execute an arbitrary script or possibly an uploaded binary. Remediation in Version 6.7.0, release date: 20-Oct-24. | |
| Title | Keysight Ixia Vision Product Family Path Traversal | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2025-03-05T16:09:05.368Z
Reserved: 2025-02-05T15:36:40.967Z
Link: CVE-2025-24494
Updated: 2025-03-05T16:09:01.382Z
Status : Received
Published: 2025-03-05T16:15:38.937
Modified: 2025-03-05T16:15:38.937
Link: CVE-2025-24494
No data.
OpenCVE Enrichment
No data.
EUVD