Freebox v5 HD (firmware = 1.7.20), Freebox v5 Crystal (firmware = 1.7.20), Freebox v6 Révolution r1–r3 (firmware = 4.7.x), Freebox Mini 4K (firmware = 4.7.x), and Freebox One (firmware = 4.7.x) were discovered to expose subscribers' IMSI identifiers in plaintext during the initial phase of EAP-SIM authentication over the `FreeWifi_secure` network. During the EAP-Response/Identity exchange, the subscriber's full Network Access Identifier (NAI), which embeds the raw IMSI, is transmitted without encryption, tunneling, or pseudonymization. An attacker located within Wi-Fi range (~100 meters) can passively capture these frames without requiring user interaction or elevated privileges. The disclosed IMSI enables device tracking, subscriber correlation, and long-term monitoring of user presence near any broadcasting Freebox device. The vendor acknowledged the vulnerability, and the `FreeWifi_secure` service is planned for full deactivation by 1 October 2025.

Project Subscriptions

Vendors Products
Freebox Hd Subscribe
Freebox Mini Subscribe
Freebox One Subscribe
Freebox Os Subscribe
Freebox Revolution Subscribe
Freebox V5 Subscribe
Freebox Subscribe
Mini 4k Subscribe
Mini 4k Firmware Subscribe
One Firmware Subscribe
V5 Crystal Subscribe
V5 Crystal Firmware Subscribe
V5 Hd Firmware Subscribe
V6 Revolution Subscribe
V6 Revolution Firmware Subscribe
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 04 Feb 2026 21:00:00 +0000

Type Values Removed Values Added
First Time appeared Freebox
Freebox mini 4k
Freebox mini 4k Firmware
Freebox one
Freebox one Firmware
Freebox v5 Crystal
Freebox v5 Crystal Firmware
Freebox v5 Hd
Freebox v5 Hd Firmware
Freebox v6 Revolution
Freebox v6 Revolution Firmware
CPEs cpe:2.3:h:freebox:mini_4k:-:*:*:*:*:*:*:*
cpe:2.3:h:freebox:one:-:*:*:*:*:*:*:*
cpe:2.3:h:freebox:v5_crystal:-:*:*:*:*:*:*:*
cpe:2.3:h:freebox:v5_hd:-:*:*:*:*:*:*:*
cpe:2.3:h:freebox:v6_revolution:-:*:*:*:*:*:*:*
cpe:2.3:o:freebox:mini_4k_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:freebox:one_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:freebox:v5_crystal_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:freebox:v5_hd_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:freebox:v6_revolution_firmware:*:*:*:*:*:*:*:*
Vendors & Products Freebox
Freebox mini 4k
Freebox mini 4k Firmware
Freebox one
Freebox one Firmware
Freebox v5 Crystal
Freebox v5 Crystal Firmware
Freebox v5 Hd
Freebox v5 Hd Firmware
Freebox v6 Revolution
Freebox v6 Revolution Firmware

Tue, 18 Nov 2025 17:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-319
Metrics cvssV3_1

{'score': 3.5, 'vector': 'CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 18 Nov 2025 09:15:00 +0000

Type Values Removed Values Added
First Time appeared Free
Free freebox Hd
Free freebox Mini
Free freebox One
Free freebox Os
Free freebox Revolution
Free freebox V5
Vendors & Products Free
Free freebox Hd
Free freebox Mini
Free freebox One
Free freebox Os
Free freebox Revolution
Free freebox V5

Mon, 17 Nov 2025 19:45:00 +0000

Type Values Removed Values Added
Description reebox v5 HD (firmware = 1.7.20), Freebox v5 Crystal (firmware = 1.7.20), Freebox v6 Révolution r1–r3 (firmware = 4.7.x), Freebox Mini 4K (firmware = 4.7.x), and Freebox One (firmware = 4.7.x) were discovered to expose subscribers' IMSI identifiers in plaintext during the initial phase of EAP-SIM authentication over the `FreeWifi_secure` network. During the EAP-Response/Identity exchange, the subscriber's full Network Access Identifier (NAI), which embeds the raw IMSI, is transmitted without encryption, tunneling, or pseudonymization. An attacker located within Wi-Fi range (~100 meters) can passively capture these frames without requiring user interaction or elevated privileges. The disclosed IMSI enables device tracking, subscriber correlation, and long-term monitoring of user presence near any broadcasting Freebox device. The vendor acknowledged the vulnerability, and the `FreeWifi_secure` service is planned for full deactivation by 1 October 2025. Freebox v5 HD (firmware = 1.7.20), Freebox v5 Crystal (firmware = 1.7.20), Freebox v6 Révolution r1–r3 (firmware = 4.7.x), Freebox Mini 4K (firmware = 4.7.x), and Freebox One (firmware = 4.7.x) were discovered to expose subscribers' IMSI identifiers in plaintext during the initial phase of EAP-SIM authentication over the `FreeWifi_secure` network. During the EAP-Response/Identity exchange, the subscriber's full Network Access Identifier (NAI), which embeds the raw IMSI, is transmitted without encryption, tunneling, or pseudonymization. An attacker located within Wi-Fi range (~100 meters) can passively capture these frames without requiring user interaction or elevated privileges. The disclosed IMSI enables device tracking, subscriber correlation, and long-term monitoring of user presence near any broadcasting Freebox device. The vendor acknowledged the vulnerability, and the `FreeWifi_secure` service is planned for full deactivation by 1 October 2025.

Mon, 17 Nov 2025 18:30:00 +0000

Type Values Removed Values Added
Description reebox v5 HD (firmware = 1.7.20), Freebox v5 Crystal (firmware = 1.7.20), Freebox v6 Révolution r1–r3 (firmware = 4.7.x), Freebox Mini 4K (firmware = 4.7.x), and Freebox One (firmware = 4.7.x) were discovered to expose subscribers' IMSI identifiers in plaintext during the initial phase of EAP-SIM authentication over the `FreeWifi_secure` network. During the EAP-Response/Identity exchange, the subscriber's full Network Access Identifier (NAI), which embeds the raw IMSI, is transmitted without encryption, tunneling, or pseudonymization. An attacker located within Wi-Fi range (~100 meters) can passively capture these frames without requiring user interaction or elevated privileges. The disclosed IMSI enables device tracking, subscriber correlation, and long-term monitoring of user presence near any broadcasting Freebox device. The vendor acknowledged the vulnerability, and the `FreeWifi_secure` service is planned for full deactivation by 1 October 2025.
References

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2025-11-18T16:23:31.441Z

Reserved: 2025-10-27T00:00:00.000Z

Link: CVE-2025-63292

cve-icon Vulnrichment

Updated: 2025-11-18T16:20:47.796Z

cve-icon NVD

Status : Analyzed

Published: 2025-11-17T19:16:20.037

Modified: 2026-02-04T20:50:13.497

Link: CVE-2025-63292

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-11-18T09:06:02Z

Weaknesses