- Description
- Path traversal may allow remote code execution using privileged account (requires device admin account, cannot be performed by a regular user). In combination with the 'Upload' functionality this could be used to execute an arbitrary script or possibly an uploaded binary. Remediation in Version 6.7.0, release date: 20-Oct-24.
- Source
- ics-cert@hq.dhs.gov
- NVD status
- Received
CVSS 4.0
- Type
- Secondary
- Base score
- 8.6
- Impact score
- -
- Exploitability score
- -
- Vector string
- CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
- Severity
- HIGH
CVSS 3.1
- Type
- Secondary
- Base score
- 7.2
- Impact score
- 5.9
- Exploitability score
- 1.2
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
- Severity
- HIGH
- ics-cert@hq.dhs.gov
- CWE-22
Hype score is a measure of social media activity compared against trending CVEs from the past 12 months. Max score 100.
- Hype score
1
Actively exploited CVE : CVE-2025-24494
@transilienceai
2 Apr 2025
18 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
Actively exploited CVE : CVE-2025-24494
@transilienceai
11 Mar 2025
15 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
Actively exploited CVE : CVE-2025-24494
@transilienceai
11 Mar 2025
18 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
Actively exploited CVE : CVE-2025-24494
@transilienceai
10 Mar 2025
12 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
Actively exploited CVE : CVE-2025-24494
@transilienceai
10 Mar 2025
14 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
Actively exploited CVE : CVE-2025-24494
@transilienceai
9 Mar 2025
7 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
Actively exploited CVE : CVE-2025-24494
@transilienceai
8 Mar 2025
3 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
Actively exploited CVE : CVE-2025-24494
@transilienceai
7 Mar 2025
7 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
🚨 CVE-2025-24494 🔴 HIGH (7.2) 🏢 Keysight - Ixia Vision Product Family 🏗️ 6.3.1 🔗 https://t.co/TnEuYMHKl5 🔗 https://t.co/pcG7aw5DTJ 🔗 https://t.co/9JeRlE7nM9 🔗 https://t.co/Mi2jDOnRn8 #CyberCron #VulnAlert #InfoSec https://t.co/V1CXd5YrIF
@cybercronai
7 Mar 2025
96 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
1 Quote
Actively exploited CVE : CVE-2025-24494
@transilienceai
7 Mar 2025
12 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
CVE-2025-24494 Path traversal may allow remote code execution using privileged account (requires device admin account, cannot be performed by a regular user). In combination with … https://t.co/UIzWLaGxEv
@CVEnew
6 Mar 2025
57 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 CVE-2025-24494 🔴 HIGH (7.2) 🏢 Keysight - Ixia Vision Product Family 🏗️ 6.3.1 🔗 https://t.co/TnEuYMHKl5 🔗 https://t.co/pcG7aw5DTJ 🔗 https://t.co/9JeRlE7nM9 🔗 https://t.co/Mi2jDOnRn8 #CyberCron #VulnAlert #InfoSec @Keysight https://t.co/NyCpfCqek3
@cybercronai
5 Mar 2025
17 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
[CVE-2025-24494: HIGH] Warning: Path traversal vulnerability can lead to remote code execution with admin account. Update to Version 6.7.0 by 20-Oct-24 to mitigate the risk. #cybersecurity#cybersecurity,#vulnerability https://t.co/RiOPyYePGl https://t.co/eOaOf6VVO6
@CveFindCom
5 Mar 2025
46 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
⚠️ Vulnerability Alert: Keysight Ixia Vision Product Family Vulnerabilities 📅 Timeline: Disclosure: 2025-03-04, Patch: 2025-03-01 📌 Attribution: NATO Cyber Security Centre (NCSC) 🆔cveId: CVE-2025-24494, CVE-2025-21095, CVE-2025-23416, CVE-2025-24521 📊baseScore: 7.2… https:/
@syedaquib77
5 Mar 2025
24 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Actively exploited CVE : CVE-2025-24494
@transilienceai
5 Mar 2025
8 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
⚠️ Vulnerability Alert: Path Traversal and Improper Restriction of XML External Entity Reference 📅 Timeline: Disclosure: 2025-03-04, Patch: 2025-01-03 📌 Attribution: NATO Cyber Security Centre (NCSC) 🆔cveId: CVE-2025-24494 📊baseScore: 8.6 📏cvssMetrics:… https://t.co/jEWY1
@syedaquib77
4 Mar 2025
23 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes