PatchSiren

PatchSiren cyber security CVE debrief

CVE-2025-61945 Radiometrics CVE debrief

CVE-2025-61945 is a critical Radiometrics VizAir issue published by CISA on 2025-11-04. The advisory describes unauthenticated remote access to the VizAir admin panel, allowing changes to operational weather parameters used for aviation decision-making. Because those values can influence alerting and runway-related decisions, the impact is safety-relevant and potentially severe. The vendor advisory states affected systems were updated and that no further action is needed on the user’s end, but operators should still verify they are on the fixed release and that administrative access is not exposed.

Vendor
Radiometrics
Product
VizAir
CVSS
CRITICAL 10
CISA KEV
Not listed in stored evidence
Original CVE published
2025-11-04
Original CVE updated
2025-11-04
Advisory published
2025-11-04
Advisory updated
2025-11-04

Who should care

Radiometrics VizAir operators, airport and aviation weather system administrators, OT/ICS security teams, and organizations that rely on VizAir outputs for flight safety, runway coordination, or alerting.

Technical summary

According to the CISA CSAF advisory, a remote attacker can reach the VizAir admin panel without authentication and modify critical weather parameters such as wind shear alerts, inversion depth, and CAPE values. The advisory associates this condition with a CVSS v3.1 vector of AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H, reflecting network-reachable, unauthenticated access with severe integrity and availability consequences across adjacent systems or decisions. CISA’s published remediation note says Radiometrics updated all affected systems.

Defensive priority

Urgent. This is a CVSS 10.0 issue affecting a safety-relevant aviation/OT workflow. Even with vendor remediation reported, exposed or unverified deployments should be checked immediately.

Recommended defensive actions

  • Confirm your VizAir deployment is running the vendor-fixed release and that all affected systems have received the update.
  • Review whether the VizAir admin panel is reachable from untrusted networks; restrict access to trusted management paths only.
  • Audit administrative access logs and configuration history for unexpected changes to weather thresholds, alerting, or runway-related settings.
  • Validate that downstream alerting and operational decision-support outputs are functioning as expected after patching.
  • If you cannot verify the fixed version or suspect exposure, coordinate with Radiometrics support and isolate the system until confirmed safe.

Evidence notes

All claims are based on the supplied CISA CSAF advisory for ICSA-25-308-04 / CVE-2025-61945 and the listed official references. The advisory text states unauthenticated access to the admin panel, modification of weather parameters, and a vendor remediation note indicating affected systems were updated. No exploit steps or unsupported product details are included.

Official resources

CISA published the advisory for CVE-2025-61945 / ICSA-25-308-04 on 2025-11-04. The source record shows an initial publication revision on the same date, and the vendor remediation note says affected systems were updated.