Description

Freebox v5 HD (firmware = 1.7.20), Freebox v5 Crystal (firmware = 1.7.20), Freebox v6 Révolution r1–r3 (firmware = 4.7.x), Freebox Mini 4K (firmware = 4.7.x), and Freebox One (firmware = 4.7.x) were discovered to expose subscribers' IMSI identifiers in plaintext during the initial phase of EAP-SIM authentication over the `FreeWifi_secure` network. During the EAP-Response/Identity exchange, the subscriber's full Network Access Identifier (NAI), which embeds the raw IMSI, is transmitted without encryption, tunneling, or pseudonymization. An attacker located within Wi-Fi range (~100 meters) can passively capture these frames without requiring user interaction or elevated privileges. The disclosed IMSI enables device tracking, subscriber correlation, and long-term monitoring of user presence near any broadcasting Freebox device. The vendor acknowledged the vulnerability, and the `FreeWifi_secure` service is planned for full deactivation by 1 October 2025.

INFO

Published Date :

2025-11-17T00:00:00.000Z

Last Modified :

2025-11-18T16:23:31.441Z

Source :

mitre
AFFECTED PRODUCTS

The following products are affected by CVE-2025-63292 vulnerability.

Vendors Products
Free
  • Freebox Hd
  • Freebox Mini
  • Freebox One
  • Freebox Os
  • Freebox Revolution
  • Freebox V5
Freebox
  • Mini 4k
  • Mini 4k Firmware
  • One
  • One Firmware
  • V5 Crystal
  • V5 Crystal Firmware
  • V5 Hd
  • V5 Hd Firmware
  • V6 Revolution
  • V6 Revolution Firmware
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2025-63292.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact