CVE-2025-63292

3.5 LOW

πŸ“‹ TL;DR

This vulnerability exposes subscribers' IMSI identifiers in plaintext during EAP-SIM authentication on Freebox devices' FreeWifi_secure network. An attacker within Wi-Fi range can passively capture these identifiers without user interaction, enabling device tracking and subscriber correlation. All users of affected Freebox devices with FreeWifi_secure enabled are impacted.

πŸ’» Affected Systems

Products:
  • Freebox v5 HD
  • Freebox v5 Crystal
  • Freebox v6 RΓ©volution r1–r3
  • Freebox Mini 4K
  • Freebox One
Versions: Firmware 1.7.20 for v5 models, firmware 4.7.x for v6/Mini/One models
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects devices with FreeWifi_secure service enabled. The vulnerability exists during EAP-SIM authentication on this specific network.

⚠️ Risk & Real-World Impact

πŸ”΄

Worst Case

Persistent tracking of subscriber movements, correlation of multiple devices to the same subscriber, long-term surveillance of user presence near Freebox devices, potential for targeted attacks using IMSI information.

🟠

Likely Case

Passive collection of IMSI identifiers by nearby attackers, creation of movement profiles for subscribers, correlation of devices to specific subscribers over time.

🟒

If Mitigated

Limited exposure window until service deactivation, reduced tracking capability if users avoid affected networks, minimal impact if FreeWifi_secure is disabled.

🌐 Internet-Facing: LOW
🏒 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires only passive Wi-Fi sniffing within range (~100m). No authentication or user interaction needed. Public proof-of-concept demonstrates IMSI capture.

πŸ› οΈ Fix & Mitigation

βœ… Official Fix

Patch Version: N/A

Vendor Advisory: https://7h30th3r0n3.fr/the-vulnerability-that-killed-freewifi_secure/

Restart Required: No

Instructions:

No firmware patch available. The vendor plans to fully deactivate FreeWifi_secure service by October 1, 2025. Users should disable FreeWifi_secure immediately.

πŸ”§ Temporary Workarounds

Disable FreeWifi_secure

all

Completely disable the FreeWifi_secure service on affected Freebox devices to prevent IMSI exposure.

Access Freebox admin interface > Network > Wi-Fi > Disable FreeWifi_secure

Use alternative authentication

all

Switch to WPA2/WPA3 personal or enterprise authentication instead of EAP-SIM on FreeWifi_secure.

Access Freebox admin interface > Network > Wi-Fi > Change authentication method

🧯 If You Can't Patch

  • Disable FreeWifi_secure service immediately through device administration interface
  • Use alternative Wi-Fi networks and avoid connecting to FreeWifi_secure

πŸ” How to Verify

Check if Vulnerable:

Check if FreeWifi_secure is enabled on affected Freebox devices. Use Wi-Fi sniffing tools to capture EAP-Response/Identity frames and check for plaintext IMSI in NAI.

Check Version:

Access Freebox admin interface > System > Information to check firmware version

Verify Fix Applied:

Verify FreeWifi_secure service is disabled in device settings. Confirm no EAP-SIM authentication traffic is broadcast from the device.

πŸ“‘ Detection & Monitoring

Log Indicators:

  • EAP-SIM authentication attempts
  • FreeWifi_secure service activity logs

Network Indicators:

  • EAP-Response/Identity frames containing plaintext IMSI in NAI
  • 802.1X authentication traffic on FreeWifi_secure SSID

SIEM Query:

source="freebox" AND (event_type="eap_auth" OR ssid="FreeWifi_secure")

πŸ”— References

πŸ“€ Share & Export