PatchSiren cyber security CVE debrief
CVE-2025-2081 Optigo Networks CVE debrief
CISA’s 2025-03-11 advisory says Optigo Networks Visual BACnet Capture Tool and Optigo Visual Networks Capture Tool version 3.1.2rc11 can be affected by an attacker impersonating the web application service and misleading victim clients. The published CVSS v3.1 score is 7.5 HIGH, with network access, no privileges, no user interaction, and high availability impact. The vendor’s recommended fix is to upgrade to v3.1.3rc8.
- Vendor
- Optigo Networks
- Product
- Visual BACnet Capture Tool
- CVSS
- HIGH 7.5
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2025-03-11
- Original CVE updated
- 2025-03-11
- Advisory published
- 2025-03-11
- Advisory updated
- 2025-03-11
Who should care
Organizations using either Optigo capture tool variant at 3.1.2rc11, especially OT/ICS owners, administrators, and network defenders responsible for the web application service.
Technical summary
The CSAF advisory identifies two affected products, both at version 3.1.2rc11. The issue is described as attacker impersonation of the web application service, which can mislead clients; the CVSS vector indicates a network-reachable, unauthenticated issue with high availability impact (A:H) and no stated confidentiality or integrity impact.
Defensive priority
High. The issue is network-reachable, requires no privileges or user interaction, and the advisory rates it 7.5 HIGH with high availability impact.
Recommended defensive actions
- Upgrade Optigo Networks Visual BACnet Capture Tool to version v3.1.3rc8.
- Upgrade Optigo Visual Networks Capture Tool to version v3.1.3rc8.
- Inventory environments for any 3.1.2rc11 installations and confirm the fixed release is deployed everywhere.
- Follow CISA ICS recommended practices and defense-in-depth guidance to reduce exposure and strengthen monitoring in OT/ICS networks.
Evidence notes
CISA CSAF advisory ICSA-25-070-02, published 2025-03-11, lists both product variants at version 3.1.2rc11 as affected and recommends v3.1.3rc8 as the fix. The provided CVSS vector is CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H, matching the published 7.5 HIGH score. The supplied corpus includes no KEV entry and no ransomware-campaign note.
Official resources
-
CVE-2025-2081 CVE record
CVE.org
-
CVE-2025-2081 NVD detail
NVD
-
Source item URL
cisa_csaf
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
Publicly disclosed by CISA in ICSA-25-070-02 on 2025-03-11. The supplied corpus shows no CISA KEV listing and no ransomware association.