SB2025032403 - Multiple vulnerabilities in Optigo Networks Visual BACnet Capture Tool and Optigo Visual Networks Capture Tool



SB2025032403 - Multiple vulnerabilities in Optigo Networks Visual BACnet Capture Tool and Optigo Visual Networks Capture Tool

Published: March 24, 2025

Security Bulletin ID SB2025032403
Severity
High
Patch available
YES
Number of vulnerabilities 3
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 3 secuirty vulnerabilities.


1) Use of Hard-coded, Security-relevant Constants (CVE-ID: CVE-2025-2079)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to the affected application contains a hard coded secret key. A remote attacker can generate valid JWT (JSON Web Token) sessions.


2) Authentication bypass using an alternate path or channel (CVE-ID: CVE-2025-2080)

The vulnerability allows a remote attacker to bypass authentication process.

The vulnerability exists due to the authentication bypass using an alternate path or channel. A remote attacker can bypass authentication measures and gain controls over utilities within the products.


3) Use of Hard-coded, Security-relevant Constants (CVE-ID: CVE-2025-2081)

The vulnerability allows a remote attacker to compromise the target system.

The vulnerability exists due to the affected application contains a hard coded secret key. A remote attacker can impersonate the web application service and mislead victim clients.


Remediation

Install update from vendor's website.