CVE-2025-25736: n/a
Kapsch TrafficCom RIS-9260 RSU LEO v3.2.0.829.23, v3.8.0.1119.42, and v4.6.0.1211.28 were discovered to contain Android Debug Bridge (ADB) pre-installed (/mnt/c3platpersistent/opt/platform-tools/adb) and enabled by default, allowing unauthenticated root shell access to the cellular modem via the default 'kapsch' user.
AI Analysis
Technical Summary
CVE-2025-25736 is a critical vulnerability affecting specific versions of the Kapsch TrafficCom RIS-9260 RSU LEO devices, namely versions 3.2.0.829.23, 3.8.0.1119.42, and 4.6.0.1211.28. These devices have the Android Debug Bridge (ADB) pre-installed and enabled by default at the path /mnt/c3platpersistent/opt/platform-tools/adb. The vulnerability allows unauthenticated attackers to gain root shell access to the cellular modem by connecting via the default 'kapsch' user account. This means that an attacker with network access to the device can execute arbitrary commands with root privileges without needing any authentication or user interaction. The vulnerability is classified under CWE-306 (Missing Authentication for Critical Function) and has a CVSS v3.1 base score of 9.8, indicating a critical severity level. The attack vector is network-based (AV:N), requires no privileges (PR:N), no user interaction (UI:N), and impacts confidentiality, integrity, and availability to a high degree (C:H/I:H/A:H). The scope is unchanged (S:U), meaning the vulnerability affects the vulnerable component itself. The lack of authentication on a critical debugging interface like ADB on a cellular modem embedded in traffic infrastructure devices exposes them to full compromise, potentially allowing attackers to manipulate traffic data, disrupt communications, or use the device as a pivot point for further network attacks. No patches or mitigations are currently linked, and no known exploits in the wild have been reported as of the publication date.
Potential Impact
For European organizations, especially those involved in traffic management, transportation infrastructure, and smart city deployments, this vulnerability poses a significant risk. Kapsch TrafficCom is a major provider of intelligent transportation systems in Europe, and their RIS-9260 RSU LEO devices are likely deployed in critical road infrastructure for vehicle-to-infrastructure communication. Exploitation could lead to unauthorized control over traffic signals, disruption of traffic flow, or manipulation of data used for traffic monitoring and enforcement. This could result in safety hazards, traffic congestion, and loss of public trust. Additionally, attackers gaining root access to the cellular modem could intercept or manipulate cellular communications, potentially affecting connected services relying on these devices. The high severity and ease of exploitation (no authentication or user interaction required) increase the likelihood of targeted attacks or opportunistic exploitation. The impact extends beyond operational disruption to potential breaches of privacy and data integrity in connected transportation systems.
Mitigation Recommendations
Immediate mitigation steps include isolating the affected devices from untrusted networks to limit exposure to potential attackers. Network segmentation should be enforced to ensure that only authorized management systems can access the RSU devices. Since no official patches are currently available, organizations should contact Kapsch TrafficCom for guidance and monitor for firmware updates addressing this vulnerability. Disabling or restricting access to the ADB interface on the devices, if possible, is critical; this may require manual configuration or firmware modification. Implementing strict access controls and monitoring network traffic for unusual activity targeting the ADB port or the default 'kapsch' user can help detect exploitation attempts. Additionally, organizations should review and change any default credentials and ensure that device management interfaces are not exposed to the public internet. Incorporating intrusion detection systems (IDS) tailored to detect ADB-related traffic anomalies can provide early warning. Finally, organizations should prepare incident response plans specific to this vulnerability to quickly respond to any detected exploitation.
Affected Countries
Germany, Austria, Switzerland, France, Netherlands, Belgium, Czech Republic, Slovakia
CVE-2025-25736: n/a
Description
Kapsch TrafficCom RIS-9260 RSU LEO v3.2.0.829.23, v3.8.0.1119.42, and v4.6.0.1211.28 were discovered to contain Android Debug Bridge (ADB) pre-installed (/mnt/c3platpersistent/opt/platform-tools/adb) and enabled by default, allowing unauthenticated root shell access to the cellular modem via the default 'kapsch' user.
AI-Powered Analysis
Technical Analysis
CVE-2025-25736 is a critical vulnerability affecting specific versions of the Kapsch TrafficCom RIS-9260 RSU LEO devices, namely versions 3.2.0.829.23, 3.8.0.1119.42, and 4.6.0.1211.28. These devices have the Android Debug Bridge (ADB) pre-installed and enabled by default at the path /mnt/c3platpersistent/opt/platform-tools/adb. The vulnerability allows unauthenticated attackers to gain root shell access to the cellular modem by connecting via the default 'kapsch' user account. This means that an attacker with network access to the device can execute arbitrary commands with root privileges without needing any authentication or user interaction. The vulnerability is classified under CWE-306 (Missing Authentication for Critical Function) and has a CVSS v3.1 base score of 9.8, indicating a critical severity level. The attack vector is network-based (AV:N), requires no privileges (PR:N), no user interaction (UI:N), and impacts confidentiality, integrity, and availability to a high degree (C:H/I:H/A:H). The scope is unchanged (S:U), meaning the vulnerability affects the vulnerable component itself. The lack of authentication on a critical debugging interface like ADB on a cellular modem embedded in traffic infrastructure devices exposes them to full compromise, potentially allowing attackers to manipulate traffic data, disrupt communications, or use the device as a pivot point for further network attacks. No patches or mitigations are currently linked, and no known exploits in the wild have been reported as of the publication date.
Potential Impact
For European organizations, especially those involved in traffic management, transportation infrastructure, and smart city deployments, this vulnerability poses a significant risk. Kapsch TrafficCom is a major provider of intelligent transportation systems in Europe, and their RIS-9260 RSU LEO devices are likely deployed in critical road infrastructure for vehicle-to-infrastructure communication. Exploitation could lead to unauthorized control over traffic signals, disruption of traffic flow, or manipulation of data used for traffic monitoring and enforcement. This could result in safety hazards, traffic congestion, and loss of public trust. Additionally, attackers gaining root access to the cellular modem could intercept or manipulate cellular communications, potentially affecting connected services relying on these devices. The high severity and ease of exploitation (no authentication or user interaction required) increase the likelihood of targeted attacks or opportunistic exploitation. The impact extends beyond operational disruption to potential breaches of privacy and data integrity in connected transportation systems.
Mitigation Recommendations
Immediate mitigation steps include isolating the affected devices from untrusted networks to limit exposure to potential attackers. Network segmentation should be enforced to ensure that only authorized management systems can access the RSU devices. Since no official patches are currently available, organizations should contact Kapsch TrafficCom for guidance and monitor for firmware updates addressing this vulnerability. Disabling or restricting access to the ADB interface on the devices, if possible, is critical; this may require manual configuration or firmware modification. Implementing strict access controls and monitoring network traffic for unusual activity targeting the ADB port or the default 'kapsch' user can help detect exploitation attempts. Additionally, organizations should review and change any default credentials and ensure that device management interfaces are not exposed to the public internet. Incorporating intrusion detection systems (IDS) tailored to detect ADB-related traffic anomalies can provide early warning. Finally, organizations should prepare incident response plans specific to this vulnerability to quickly respond to any detected exploitation.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2025-02-07T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 68adcca5ad5a09ad005926b0
Added to database: 8/26/2025, 3:03:01 PM
Last enriched: 9/3/2025, 1:11:43 AM
Last updated: 10/10/2025, 2:49:51 PM
Views: 46
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-60378: n/a
UnknownCVE-2025-8886: CWE-732 Incorrect Permission Assignment for Critical Resource in Usta Information Systems Inc. Aybs Interaktif
MediumCVE-2025-61319: n/a
MediumCVE-2025-61152: n/a
MediumCVE-2025-8887: CWE-639 Authorization Bypass Through User-Controlled Key in Usta Information Systems Inc. Aybs Interaktif
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.