Metrics
Affected Vendors & Products
No advisories yet.
Solution
Radiometrics performed updates on all affected systems and resolved these vulnerabilities. No further action is needed on the user's end.
Workaround
No workaround given by the vendor.
Tue, 04 Nov 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 04 Nov 2025 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Radiometrics VizAir is vulnerable to exposure of the system's REST API key through a publicly accessible configuration file. This allows attackers to remotely alter weather data and configurations, automate attacks against multiple instances, and extract sensitive meteorological data, which could potentially compromise airport operations. Additionally, attackers could flood the system with false alerts, leading to a denial-of-service condition and significant disruption to airport operations. Unauthorized remote control over aviation weather monitoring and data manipulation could result in incorrect flight planning and hazardous takeoff and landing conditions. | |
| Title | Insufficiently Protected Credentials in Radiometrics VizAir | |
| Weaknesses | CWE-522 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2025-11-04T16:31:15.814Z
Reserved: 2025-10-07T19:42:54.161Z
Link: CVE-2025-54863
Updated: 2025-11-04T16:30:46.370Z
Status : Received
Published: 2025-11-04T17:16:22.967
Modified: 2025-11-04T17:16:22.967
Link: CVE-2025-54863
No data.
OpenCVE Enrichment
No data.