Radiometrics VizAir is vulnerable to exposure of the system's REST API key through a publicly accessible configuration file. This allows attackers to remotely alter weather data and configurations, automate attacks against multiple instances, and extract sensitive meteorological data, which could potentially compromise airport operations. Additionally, attackers could flood the system with false alerts, leading to a denial-of-service condition and significant disruption to airport operations. Unauthorized remote control over aviation weather monitoring and data manipulation could result in incorrect flight planning and hazardous takeoff and landing conditions.
Advisories

No advisories yet.

Fixes

Solution

Radiometrics performed updates on all affected systems and resolved these vulnerabilities. No further action is needed on the user's end.


Workaround

No workaround given by the vendor.

History

Tue, 04 Nov 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 04 Nov 2025 16:30:00 +0000

Type Values Removed Values Added
Description Radiometrics VizAir is vulnerable to exposure of the system's REST API key through a publicly accessible configuration file. This allows attackers to remotely alter weather data and configurations, automate attacks against multiple instances, and extract sensitive meteorological data, which could potentially compromise airport operations. Additionally, attackers could flood the system with false alerts, leading to a denial-of-service condition and significant disruption to airport operations. Unauthorized remote control over aviation weather monitoring and data manipulation could result in incorrect flight planning and hazardous takeoff and landing conditions.
Title Insufficiently Protected Credentials in Radiometrics VizAir
Weaknesses CWE-522
References
Metrics cvssV3_1

{'score': 10, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H'}

cvssV4_0

{'score': 10, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2025-11-04T16:31:15.814Z

Reserved: 2025-10-07T19:42:54.161Z

Link: CVE-2025-54863

cve-icon Vulnrichment

Updated: 2025-11-04T16:30:46.370Z

cve-icon NVD

Status : Received

Published: 2025-11-04T17:16:22.967

Modified: 2025-11-04T17:16:22.967

Link: CVE-2025-54863

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.