Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-25733: n/a

0
Low
VulnerabilityCVE-2025-25733cvecve-2025-25733
Published: Tue Aug 26 2025 (08/26/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2025-25733 is a vulnerability in the SPI Flash Chip of Kapsch TrafficCom RIS-9160 and RIS-9260 Roadside Units (RSUs) across multiple firmware versions. It allows attackers with physical proximity to modify SPI flash memory regions due to incorrect access control. This can degrade the security posture of the affected devices by potentially enabling unauthorized firmware or configuration changes. The vulnerability has a CVSS score of 3. 5, indicating low severity, primarily impacting confidentiality and integrity without affecting availability. Exploitation requires physical access and no user interaction or authentication is needed. No known exploits are currently reported in the wild. European organizations relying on these RSUs for traffic management and infrastructure security could face risks of tampering or sabotage if physical security is insufficient. Mitigation involves enhancing physical security controls, monitoring for unauthorized access, and applying vendor patches once available. Countries with extensive smart traffic infrastructure deployments and Kapsch TrafficCom presence, such as Germany, Austria, and the Netherlands, are most likely to be affected.

AI-Powered Analysis

AILast updated: 10/29/2025, 15:23:57 UTC

Technical Analysis

CVE-2025-25733 identifies an incorrect access control vulnerability in the SPI Flash Chip of Kapsch TrafficCom RIS-9160 and RIS-9260 Roadside Units (RSUs) running firmware versions 3.2.0.829.23, 3.8.0.1119.42, and 4.6.0.1211.28. The SPI flash memory stores critical firmware and configuration data essential for the RSU's operation and security. Due to improper access restrictions, an attacker with physical proximity can directly modify arbitrary regions of the SPI flash chip. This unauthorized modification capability can lead to degradation of the device's security posture by enabling firmware tampering, insertion of malicious code, or alteration of security-critical parameters. The vulnerability does not require authentication or user interaction but does require physical access, limiting remote exploitation. The CVSS v3.1 base score is 3.5 (low severity), reflecting limited impact on confidentiality and integrity, no impact on availability, and low attack vector scope (physical). No public exploits or patches are currently available, but the vulnerability is officially published and tracked under CWE-1233 (Improper Access Control). The affected devices are integral components of intelligent transportation systems, used for traffic monitoring and management, making their security critical to infrastructure resilience.

Potential Impact

For European organizations, especially those managing smart city infrastructure and traffic control systems, this vulnerability poses a risk of physical tampering with roadside units. Unauthorized modification of SPI flash memory could allow attackers to alter firmware or configurations, potentially leading to incorrect traffic data reporting, disruption of traffic management, or covert insertion of backdoors for future attacks. Although the vulnerability requires physical access, roadside units are often deployed in publicly accessible locations, increasing the risk of exploitation. The impact on confidentiality and integrity could affect data accuracy and system trustworthiness, undermining traffic safety and operational efficiency. While availability is not directly impacted, compromised RSUs could indirectly cause traffic disruptions or safety hazards. The low CVSS score reflects the limited attack vector and impact scope, but the critical nature of transportation infrastructure elevates the importance of addressing this issue promptly.

Mitigation Recommendations

1. Enhance physical security measures around RSU installations, including tamper-evident seals, locked enclosures, and surveillance cameras to deter and detect unauthorized access. 2. Implement regular physical inspections and integrity checks of RSUs to identify signs of tampering or unauthorized modifications. 3. Coordinate with Kapsch TrafficCom to obtain and apply firmware updates or patches addressing this vulnerability once released. 4. Employ cryptographic verification of firmware and configuration files to detect unauthorized changes to SPI flash contents. 5. Restrict physical access to RSUs to authorized personnel only, supported by access control policies and logging. 6. Integrate anomaly detection systems that monitor RSU behavior and alert on deviations potentially caused by firmware tampering. 7. Develop incident response plans specific to physical tampering scenarios involving RSUs to ensure rapid containment and recovery.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-02-07T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68adcca5ad5a09ad00592698

Added to database: 8/26/2025, 3:03:01 PM

Last enriched: 10/29/2025, 3:23:57 PM

Last updated: 11/25/2025, 8:06:57 AM

Views: 53

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats