Freebox v5 HD (firmware = 1.7.20), Freebox v5 Crystal (firmware = 1.7.20), Freebox v6 Révolution r1–r3 (firmware = 4.7.x), Freebox Mini 4K (firmware = 4.7.x), and Freebox One (firmware = 4.7.x) were discovered to expose subscribers' IMSI identifiers in plaintext during the initial phase of EAP-SIM authentication over the `FreeWifi_secure` network. During the EAP-Response/Identity exchange, the subscriber's full Network Access Identifier (NAI), which embeds the raw IMSI, is transmitted without encryption, tunneling, or pseudonymization. An attacker located within Wi-Fi range (~100 meters) can passively capture these frames without requiring user interaction or elevated privileges. The disclosed IMSI enables device tracking, subscriber correlation, and long-term monitoring of user presence near any broadcasting Freebox device. The vendor acknowledged the vulnerability, and the `FreeWifi_secure` service is planned for full deactivation by 1 October 2025.
Metrics
Affected Vendors & Products
References
History
Wed, 04 Feb 2026 21:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Freebox
Freebox mini 4k Freebox mini 4k Firmware Freebox one Freebox one Firmware Freebox v5 Crystal Freebox v5 Crystal Firmware Freebox v5 Hd Freebox v5 Hd Firmware Freebox v6 Revolution Freebox v6 Revolution Firmware |
|
| CPEs | cpe:2.3:h:freebox:mini_4k:-:*:*:*:*:*:*:* cpe:2.3:h:freebox:one:-:*:*:*:*:*:*:* cpe:2.3:h:freebox:v5_crystal:-:*:*:*:*:*:*:* cpe:2.3:h:freebox:v5_hd:-:*:*:*:*:*:*:* cpe:2.3:h:freebox:v6_revolution:-:*:*:*:*:*:*:* cpe:2.3:o:freebox:mini_4k_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:freebox:one_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:freebox:v5_crystal_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:freebox:v5_hd_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:freebox:v6_revolution_firmware:*:*:*:*:*:*:*:* |
|
| Vendors & Products |
Freebox
Freebox mini 4k Freebox mini 4k Firmware Freebox one Freebox one Firmware Freebox v5 Crystal Freebox v5 Crystal Firmware Freebox v5 Hd Freebox v5 Hd Firmware Freebox v6 Revolution Freebox v6 Revolution Firmware |
Tue, 18 Nov 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-319 | |
| Metrics |
cvssV3_1
|
Tue, 18 Nov 2025 09:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Free
Free freebox Hd Free freebox Mini Free freebox One Free freebox Os Free freebox Revolution Free freebox V5 |
|
| Vendors & Products |
Free
Free freebox Hd Free freebox Mini Free freebox One Free freebox Os Free freebox Revolution Free freebox V5 |
Mon, 17 Nov 2025 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | reebox v5 HD (firmware = 1.7.20), Freebox v5 Crystal (firmware = 1.7.20), Freebox v6 Révolution r1–r3 (firmware = 4.7.x), Freebox Mini 4K (firmware = 4.7.x), and Freebox One (firmware = 4.7.x) were discovered to expose subscribers' IMSI identifiers in plaintext during the initial phase of EAP-SIM authentication over the `FreeWifi_secure` network. During the EAP-Response/Identity exchange, the subscriber's full Network Access Identifier (NAI), which embeds the raw IMSI, is transmitted without encryption, tunneling, or pseudonymization. An attacker located within Wi-Fi range (~100 meters) can passively capture these frames without requiring user interaction or elevated privileges. The disclosed IMSI enables device tracking, subscriber correlation, and long-term monitoring of user presence near any broadcasting Freebox device. The vendor acknowledged the vulnerability, and the `FreeWifi_secure` service is planned for full deactivation by 1 October 2025. | Freebox v5 HD (firmware = 1.7.20), Freebox v5 Crystal (firmware = 1.7.20), Freebox v6 Révolution r1–r3 (firmware = 4.7.x), Freebox Mini 4K (firmware = 4.7.x), and Freebox One (firmware = 4.7.x) were discovered to expose subscribers' IMSI identifiers in plaintext during the initial phase of EAP-SIM authentication over the `FreeWifi_secure` network. During the EAP-Response/Identity exchange, the subscriber's full Network Access Identifier (NAI), which embeds the raw IMSI, is transmitted without encryption, tunneling, or pseudonymization. An attacker located within Wi-Fi range (~100 meters) can passively capture these frames without requiring user interaction or elevated privileges. The disclosed IMSI enables device tracking, subscriber correlation, and long-term monitoring of user presence near any broadcasting Freebox device. The vendor acknowledged the vulnerability, and the `FreeWifi_secure` service is planned for full deactivation by 1 October 2025. |
Mon, 17 Nov 2025 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | reebox v5 HD (firmware = 1.7.20), Freebox v5 Crystal (firmware = 1.7.20), Freebox v6 Révolution r1–r3 (firmware = 4.7.x), Freebox Mini 4K (firmware = 4.7.x), and Freebox One (firmware = 4.7.x) were discovered to expose subscribers' IMSI identifiers in plaintext during the initial phase of EAP-SIM authentication over the `FreeWifi_secure` network. During the EAP-Response/Identity exchange, the subscriber's full Network Access Identifier (NAI), which embeds the raw IMSI, is transmitted without encryption, tunneling, or pseudonymization. An attacker located within Wi-Fi range (~100 meters) can passively capture these frames without requiring user interaction or elevated privileges. The disclosed IMSI enables device tracking, subscriber correlation, and long-term monitoring of user presence near any broadcasting Freebox device. The vendor acknowledged the vulnerability, and the `FreeWifi_secure` service is planned for full deactivation by 1 October 2025. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-11-18T16:23:31.441Z
Reserved: 2025-10-27T00:00:00.000Z
Link: CVE-2025-63292
Updated: 2025-11-18T16:20:47.796Z
Status : Analyzed
Published: 2025-11-17T19:16:20.037
Modified: 2026-02-04T20:50:13.497
Link: CVE-2025-63292
No data.
OpenCVE Enrichment
Updated: 2025-11-18T09:06:02Z