CVE-2025-24525

7.5 HIGH

📋 TL;DR

Keysight Ixia Vision devices contain hardcoded cryptographic material that could allow attackers to intercept or decrypt API calls and user authentication traffic. This affects all users who haven't replaced the default TLS certificate shipped with the device. The vulnerability stems from using predictable or known cryptographic keys in the device's default configuration.

💻 Affected Systems

Products:
  • Keysight Ixia Vision
Versions: All versions before 6.9.1
Operating Systems: Not specified, likely appliance-based
Default Config Vulnerable: ⚠️ Yes
Notes: All devices using the default TLS certificate are vulnerable. The vulnerability is present in the default configuration shipped with the device.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could decrypt all sensitive communications including administrative credentials, configuration data, and monitoring traffic, potentially gaining full control of the device and using it as a foothold into the network.

🟠

Likely Case

Attackers with network access could intercept and decrypt API traffic, potentially obtaining administrative credentials and manipulating device configuration or test results.

🟢

If Mitigated

With proper certificate replacement before deployment, the risk is eliminated as the hardcoded material is no longer in use.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires network access to intercept traffic but doesn't require authentication. The hardcoded nature of the cryptographic material makes exploitation straightforward once the material is known.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 6.9.1

Vendor Advisory: https://support.ixiacom.com/

Restart Required: Yes

Instructions:

1. Download version 6.9.1 from Keysight support portal. 2. Backup current configuration. 3. Apply the update following vendor instructions. 4. Replace the default TLS certificate with a unique, properly generated certificate. 5. Restart the device to apply changes.

🔧 Temporary Workarounds

Replace Default TLS Certificate

all

Generate and install a new, unique TLS certificate to replace the hardcoded default certificate

# Generate new certificate (example for OpenSSL)
openssl req -x509 -newkey rsa:4096 -keyout key.pem -out cert.pem -days 365 -nodes
# Follow vendor documentation to install the new certificate

Network Segmentation

all

Isolate Ixia Vision devices from untrusted networks and limit API access to authorized management systems only

# Configure firewall rules to restrict access
# Example: Only allow specific source IPs to connect to Ixia Vision API ports

🧯 If You Can't Patch

  • Immediately replace the default TLS certificate with a unique certificate generated specifically for your deployment
  • Implement strict network access controls to limit which systems can communicate with the Ixia Vision device, preferably placing it in a management VLAN with limited access

🔍 How to Verify

Check if Vulnerable:

Check if the device is using the default TLS certificate by examining the certificate details and comparing with known default certificate fingerprints or checking if the device version is below 6.9.1

Check Version:

Check the web interface or administrative console for version information, or use vendor-specific CLI commands if available

Verify Fix Applied:

Verify the device is running version 6.9.1 or later and confirm that a unique TLS certificate (not the default) is installed and in use

📡 Detection & Monitoring

Log Indicators:

  • Unusual authentication attempts
  • Certificate validation errors
  • Unexpected API calls from unauthorized sources

Network Indicators:

  • Unencrypted or weakly encrypted traffic to/from Ixia Vision devices
  • Traffic interception attempts on ports used by Ixia Vision

SIEM Query:

source="ixia-vision" AND (event_type="authentication_failure" OR event_type="certificate_error")

🔗 References

📤 Share & Export