Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-25734: n/a

0
Medium
VulnerabilityCVE-2025-25734cvecve-2025-25734
Published: Tue Aug 26 2025 (08/26/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2025-25734 is a vulnerability affecting Kapsch TrafficCom RIS-9160 and RIS-9260 Roadside Units (RSUs) in specific firmware versions. It involves an unauthenticated EFI shell accessible during the boot process, allowing attackers to execute arbitrary code or escalate privileges without any authentication or user interaction. The vulnerability impacts confidentiality, integrity, and availability of the affected devices. Exploitation requires physical or network-level access to the device's boot environment, which is typically protected but may be exposed in certain deployment scenarios. No known exploits are currently in the wild, and no patches have been published yet. The CVSS score is 6. 8 (medium severity), reflecting the significant impact but limited attack vector. European organizations relying on these RSUs for traffic management and intelligent transportation systems could face operational disruptions, data compromise, or unauthorized control. Countries with extensive deployments of Kapsch TrafficCom infrastructure, especially those with critical transport networks, are at higher risk. Mitigation involves restricting physical and network access to RSUs, monitoring boot processes, and applying vendor updates once available.

AI-Powered Analysis

AILast updated: 10/29/2025, 15:23:16 UTC

Technical Analysis

CVE-2025-25734 is a medium-severity vulnerability identified in Kapsch TrafficCom RIS-9160 and RIS-9260 Roadside Units (RSUs), specifically in firmware versions 3.2.0.829.23, 3.8.0.1119.42, and 4.6.0.1211.28. The vulnerability arises from the presence of an unauthenticated EFI (Extensible Firmware Interface) shell accessible during the device's boot process. EFI shells provide a command-line interface at the firmware level, which can be used for system configuration and diagnostics. However, in this case, the EFI shell is exposed without authentication, allowing an attacker to execute arbitrary code or escalate privileges before the operating system loads. This can lead to full system compromise, including unauthorized firmware modifications, persistent malware implantation, or disruption of RSU functionality. The vulnerability is classified under CWE-1233 (Improper Control of the Boot Process) and CWE-284 (Improper Access Control), highlighting weaknesses in boot security and access restrictions. Exploitation does not require user interaction or prior authentication, but the attack vector is partially limited by the need for access to the boot environment, which may be physical or via network interfaces if exposed. The CVSS v3.1 score of 6.8 reflects high impact on confidentiality, integrity, and availability, but with a partial attack vector (physical or local network). No known exploits have been reported in the wild, and no patches have been released at the time of publication. The vulnerability poses a significant risk to the security and reliability of intelligent transportation systems relying on these RSUs.

Potential Impact

For European organizations, this vulnerability threatens the integrity and availability of critical traffic management infrastructure. RSUs are integral to intelligent transportation systems, enabling vehicle-to-infrastructure communication, traffic monitoring, and safety applications. Exploitation could allow attackers to manipulate traffic signals, disrupt data collection, or implant persistent malware, potentially causing traffic congestion, accidents, or loss of public trust. Confidentiality breaches could expose sensitive traffic data or system configurations. Given the reliance on these RSUs in urban and highway environments, successful attacks could have cascading effects on transportation safety and efficiency. Additionally, disruption of these systems could impact emergency response coordination and smart city operations. The medium severity rating suggests a significant but not catastrophic risk, contingent on attacker access to the boot environment. European entities managing or operating these RSUs must consider the operational and reputational risks associated with this vulnerability.

Mitigation Recommendations

1. Restrict physical access to RSUs by securing roadside cabinets and enclosures to prevent unauthorized boot access. 2. Limit network exposure of RSU management interfaces, employing network segmentation and strict firewall rules to reduce remote attack surfaces. 3. Monitor RSU boot logs and firmware integrity to detect unauthorized EFI shell access or modifications. 4. Implement hardware-based security features such as Secure Boot and Trusted Platform Module (TPM) if supported by the RSUs to prevent unauthorized boot code execution. 5. Engage with Kapsch TrafficCom for timely firmware updates or patches addressing this vulnerability and plan for prompt deployment once available. 6. Conduct regular security audits and penetration testing focusing on boot process security of RSUs. 7. Develop incident response plans specific to RSU compromise scenarios to minimize operational impact. 8. Consider deploying intrusion detection systems (IDS) that can monitor unusual network or device behavior indicative of exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-02-07T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68adcca5ad5a09ad005926a0

Added to database: 8/26/2025, 3:03:01 PM

Last enriched: 10/29/2025, 3:23:16 PM

Last updated: 11/22/2025, 5:52:40 AM

Views: 45

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats