VYPR
Medium severity4.9NVD Advisory· Published Mar 5, 2025· Updated Apr 15, 2026

CVE-2025-23416

CVE-2025-23416

Description

Path traversal may lead to arbitrary file deletion. The score without least privilege principle violation is as calculated below. In combination with other issues it may facilitate further compromise of the device. Remediation in Version 6.8.0, release date: 01-Mar-25.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

An XML External Entity (XXE) injection in Keysight Ixia Vision products allows authenticated admins to arbitrarily download files, potentially facilitating further device compromise.

Vulnerability

Overview

CVE-2025-23416 is an XML External Entity (XXE) injection vulnerability (CWE-611) in Keysight's Ixia Vision Network Packet Broker firmware version 6.3.1. The flaw resides in the XML parser, which does not properly restrict external entity references, allowing an attacker with a privileged (administrator) account to arbitrarily download files from the device. The vulnerability is rated with a CVSS v3.1 base score of 4.9 (Medium) due to the requirement for high privileges and the lack of impact beyond confidentiality. [1]

Exploitation

Conditions

Exploitation requires a device admin account; regular users cannot trigger this vulnerability. The attack is network-based with low complexity, meaning an authenticated admin can send a crafted XML payload to the affected endpoint. The advisory notes that when combined with a separate path traversal issue (CVE-2025-24494), the XXE could be leveraged to execute arbitrary code or upload binaries, significantly raising the overall risk. [1]

Impact and

Remediation

Successful exploitation of CVE-2025-23416 alone allows an attacker to read arbitrary files from the device filesystem, exfiltrating sensitive configuration or cryptographic material. The CISA advisory emphasizes that in combination with other vulnerabilities it may facilitate further compromise of the device. Keysight released remediation in version 6.8.0 on March 1, 2025; users are strongly advised to update to this or later versions. No workarounds are documented. [1]

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.