keysight CVE Vulnerabilities & Metrics

Focus on keysight vulnerabilities and metrics.

Last updated: 08 Mar 2025, 23:25 UTC

About keysight Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with keysight. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total keysight CVEs: 10
Earliest CVE date: 15 Dec 2020, 23:15 UTC
Latest CVE date: 19 Jul 2023, 22:15 UTC

Latest CVE reference: CVE-2023-36853

Rolling Stats

30-day Count (Rolling): 0
365-day Count (Rolling): 0

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): 0%
Year Variation (Calendar): -100.0%

Month Growth Rate (30-day Rolling): 0.0%
Year Growth Rate (365-day Rolling): -100.0%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical keysight CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 2.58

Max CVSS: 10.0

Critical CVEs (≥9): 1

CVSS Range vs. Count

Range Count
0.0-3.9 6
4.0-6.9 3
7.0-8.9 0
9.0-10.0 1

CVSS Distribution Chart

Top 5 Highest CVSS keysight CVEs

These are the five CVEs with the highest CVSS scores for keysight, sorted by severity first and recency.

All CVEs for keysight

CVE-2023-36853 keysight vulnerability CVSS: 0 19 Jul 2023, 22:15 UTC

​In Keysight Geolocation Server v2.4.2 and prior, a low privileged attacker could create a local ZIP file containing a malicious script in any location. The attacker could abuse this to load a DLL with SYSTEM privileges.

CVE-2023-34394 keysight vulnerability CVSS: 0 19 Jul 2023, 22:15 UTC

In Keysight Geolocation Server v2.4.2 and prior, an attacker could upload a specially crafted malicious file or delete any file or directory with SYSTEM privileges due to an improper path validation, which could result in local privilege escalation or a denial-of-service condition.

CVE-2023-1967 keysight vulnerability CVSS: 0 27 Apr 2023, 22:15 UTC

Keysight N8844A Data Analytics Web Service deserializes untrusted data without sufficiently verifying the resulting data will be valid.

CVE-2023-1860 keysight vulnerability CVSS: 4.0 05 Apr 2023, 09:15 UTC

A vulnerability was found in Keysight IXIA Hawkeye 3.3.16.28. It has been declared as problematic. This vulnerability affects unknown code of the file /licenses. The manipulation of the argument view with the input teste"><script>alert(%27c4ng4c3ir0%27)</script> leads to cross site scripting. The attack can be initiated remotely. VDB-224998 is the identifier assigned to this vulnerability. NOTE: Vendor did not respond if and how they may handle this issue.

CVE-2023-1399 keysight vulnerability CVSS: 0 27 Mar 2023, 16:15 UTC

N6854A Geolocation Server versions 2.4.2 are vulnerable to untrusted data deserialization, which may allow a malicious actor to escalate privileges in the affected device’s default configuration and achieve remote code execution.

CVE-2022-38130 keysight vulnerability CVSS: 0 10 Aug 2022, 20:16 UTC

The com.keysight.tentacle.config.ResourceManager.smsRestoreDatabaseZip() method is used to restore the HSQLDB database used in SMS. It takes the path of the zipped database file as the single parameter. An unauthenticated, remote attacker can specify an UNC path for the database file (i.e., \\<attacker-host>\sms\<attacker-db.zip>), effectively controlling the content of the database to be restored.

CVE-2022-38129 keysight vulnerability CVSS: 0 10 Aug 2022, 20:16 UTC

A path traversal vulnerability exists in the com.keysight.tentacle.licensing.LicenseManager.addLicenseFile() method in the Keysight Sensor Management Server (SMS). This allows an unauthenticated remote attacker to upload arbitrary files to the SMS host.

CVE-2022-1661 keysight vulnerability CVSS: 5.0 02 Jun 2022, 14:15 UTC

The affected products are vulnerable to directory traversal, which may allow an attacker to obtain arbitrary operating system files.

CVE-2022-1660 keysight vulnerability CVSS: 10.0 02 Jun 2022, 14:15 UTC

The affected products are vulnerable of untrusted data due to deserialization without prior authorization/authentication, which may allow an attacker to remotely execute arbitrary code.

CVE-2020-35121 keysight vulnerability CVSS: 6.8 15 Dec 2020, 23:15 UTC

An issue was discovered in the Keysight Database Connector plugin before 1.5.0 for Confluence. A malicious user could insert arbitrary JavaScript into saved macro parameters that would execute when a user viewed a page with that instance of the macro.