PatchSiren

PatchSiren cyber security CVE debrief

CVE-2025-2081 Optigo Networks CVE debrief

CISA’s 2025-03-11 advisory says Optigo Networks Visual BACnet Capture Tool and Optigo Visual Networks Capture Tool version 3.1.2rc11 can be affected by an attacker impersonating the web application service and misleading victim clients. The published CVSS v3.1 score is 7.5 HIGH, with network access, no privileges, no user interaction, and high availability impact. The vendor’s recommended fix is to upgrade to v3.1.3rc8.

Vendor
Optigo Networks
Product
Visual BACnet Capture Tool
CVSS
HIGH 7.5
CISA KEV
Not listed in stored evidence
Original CVE published
2025-03-11
Original CVE updated
2025-03-11
Advisory published
2025-03-11
Advisory updated
2025-03-11

Who should care

Organizations using either Optigo capture tool variant at 3.1.2rc11, especially OT/ICS owners, administrators, and network defenders responsible for the web application service.

Technical summary

The CSAF advisory identifies two affected products, both at version 3.1.2rc11. The issue is described as attacker impersonation of the web application service, which can mislead clients; the CVSS vector indicates a network-reachable, unauthenticated issue with high availability impact (A:H) and no stated confidentiality or integrity impact.

Defensive priority

High. The issue is network-reachable, requires no privileges or user interaction, and the advisory rates it 7.5 HIGH with high availability impact.

Recommended defensive actions

  • Upgrade Optigo Networks Visual BACnet Capture Tool to version v3.1.3rc8.
  • Upgrade Optigo Visual Networks Capture Tool to version v3.1.3rc8.
  • Inventory environments for any 3.1.2rc11 installations and confirm the fixed release is deployed everywhere.
  • Follow CISA ICS recommended practices and defense-in-depth guidance to reduce exposure and strengthen monitoring in OT/ICS networks.

Evidence notes

CISA CSAF advisory ICSA-25-070-02, published 2025-03-11, lists both product variants at version 3.1.2rc11 as affected and recommends v3.1.3rc8 as the fix. The provided CVSS vector is CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H, matching the published 7.5 HIGH score. The supplied corpus includes no KEV entry and no ransomware-campaign note.

Official resources

Publicly disclosed by CISA in ICSA-25-070-02 on 2025-03-11. The supplied corpus shows no CISA KEV listing and no ransomware association.