CVE-2025-63292
Gravedad CVSS v3.1:
BAJA
Tipo:
CWE-319
Transmisión de información sensible en texto claro
Fecha de publicación:
17/11/2025
Última modificación:
04/02/2026
Descripción
*** Pendiente de traducción *** Freebox v5 HD (firmware = 1.7.20), Freebox v5 Crystal (firmware = 1.7.20), Freebox v6 Révolution r1–r3 (firmware = 4.7.x), Freebox Mini 4K (firmware = 4.7.x), and Freebox One (firmware = 4.7.x) were discovered to expose subscribers' IMSI identifiers in plaintext during the initial phase of EAP-SIM authentication over the `FreeWifi_secure` network. During the EAP-Response/Identity exchange, the subscriber's full Network Access Identifier (NAI), which embeds the raw IMSI, is transmitted without encryption, tunneling, or pseudonymization. An attacker located within Wi-Fi range (~100 meters) can passively capture these frames without requiring user interaction or elevated privileges. The disclosed IMSI enables device tracking, subscriber correlation, and long-term monitoring of user presence near any broadcasting Freebox device. The vendor acknowledged the vulnerability, and the `FreeWifi_secure` service is planned for full deactivation by 1 October 2025.
Impacto
Puntuación base 3.x
3.50
Gravedad 3.x
BAJA
Productos y versiones vulnerables
| CPE | Desde | Hasta |
|---|---|---|
| cpe:2.3:o:freebox:v5_hd_firmware:*:*:*:*:*:*:*:* | 1.7.20 (incluyendo) | |
| cpe:2.3:h:freebox:v5_hd:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:freebox:v5_crystal_firmware:*:*:*:*:*:*:*:* | 1.7.20 (incluyendo) | |
| cpe:2.3:h:freebox:v5_crystal:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:freebox:v6_revolution_firmware:*:*:*:*:*:*:*:* | 4.7.0 (incluyendo) | |
| cpe:2.3:h:freebox:v6_revolution:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:freebox:mini_4k_firmware:*:*:*:*:*:*:*:* | 4.7.0 (incluyendo) | |
| cpe:2.3:h:freebox:mini_4k:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:freebox:one_firmware:*:*:*:*:*:*:*:* | 4.7.0 (incluyendo) | |
| cpe:2.3:h:freebox:one:-:*:*:*:*:*:*:* |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página



