CVE-2025-54863
Published: 04 November 2025
Description
Adversaries may target resource intensive features of applications to cause a denial of service (DoS), denying availability to those applications.
Security Summary
CVE-2025-54863 is a critical vulnerability in Radiometrics VizAir, where the system's REST API key is exposed through a publicly accessible configuration file. This issue, mapped to CWE-522 (Insufficiently Protected Credentials), carries a CVSS v3.1 base score of 10.0 (AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H), reflecting its potential for high-impact network-based exploitation without requiring authentication or user interaction.
Attackers with network access can remotely leverage the exposed API key to alter weather data and system configurations, extract sensitive meteorological information, and automate attacks against multiple VizAir instances. They could also flood the system with false alerts, resulting in denial-of-service conditions that disrupt airport operations. Such unauthorized control over aviation weather monitoring risks incorrect flight planning and hazardous takeoff or landing scenarios.
The CISA advisory ICSA-25-308-04 provides details on mitigation strategies; refer to https://www.cisa.gov/news-events/ics-advisories/icsa-25-308-04 and the associated CSAF file at https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2025/icsa-25-308-04.json for patches, workarounds, and further guidance.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise Techniques
Why these techniques?
Vulnerabilities enable exploitation of public-facing REST API and admin panel lacking authentication (T1190), exposure of API key in publicly accessible config file (T1552.001), remote alteration of stored weather data and configurations (T1565.001), and DoS via flooding API with false alerts (T1499.003).