Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-25737: n/a

0
Medium
VulnerabilityCVE-2025-25737cvecve-2025-25737
Published: Tue Aug 26 2025 (08/26/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

Kapsch TrafficCom RIS-9160 & RIS-9260 Roadside Units (RSUs) v3.2.0.829.23, v3.8.0.1119.42, and v4.6.0.1211.28 were discovered to lack secure password requirements for its BIOS Supervisor and User accounts, allowing attackers to bypass authentication via a bruteforce attack.

AI-Powered Analysis

AILast updated: 10/22/2025, 15:39:48 UTC

Technical Analysis

CVE-2025-25737 identifies a security vulnerability in Kapsch TrafficCom RIS-9160 and RIS-9260 Roadside Units (RSUs), specifically in firmware versions 3.2.0.829.23, 3.8.0.1119.42, and 4.6.0.1211.28. The core issue is the absence of secure password requirements for BIOS Supervisor and User accounts, which allows attackers to conduct brute-force attacks to bypass BIOS authentication. This vulnerability falls under CWE-521, which relates to weak password requirements. The BIOS is a critical component that controls low-level hardware initialization and security; unauthorized access here can lead to full system compromise. The CVSS v3.1 base score is 6.8 (medium severity), with an attack vector of physical (AV:P), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and impacts on confidentiality, integrity, and availability (C:H/I:H/A:H). The physical attack vector indicates that attackers need physical or local access to the device to exploit the vulnerability, which limits remote exploitation but still presents a significant risk in scenarios where physical access is possible. No patches or firmware updates are currently linked, and no known exploits have been reported in the wild. The vulnerability could allow attackers to gain unauthorized BIOS-level access, potentially enabling firmware tampering, persistent malware installation, or disabling of security features, which could disrupt traffic management systems or compromise data integrity.

Potential Impact

For European organizations, this vulnerability poses a significant risk to critical traffic infrastructure managed by Kapsch TrafficCom RSUs. Successful exploitation could lead to unauthorized control over roadside units, enabling attackers to manipulate traffic signals, disrupt traffic flow, or disable safety mechanisms. This could result in traffic congestion, increased accident risk, and broader public safety hazards. Confidentiality breaches could expose sensitive traffic data, while integrity and availability impacts could undermine trust in traffic management systems. Given the physical attack vector, the threat is more pronounced in locations where RSUs are accessible or insufficiently secured physically. Disruptions could have cascading effects on urban mobility, emergency response times, and smart city operations. The lack of secure BIOS passwords also increases the risk of persistent firmware-level attacks that are difficult to detect and remediate, potentially allowing long-term compromise of traffic infrastructure.

Mitigation Recommendations

European organizations should immediately assess physical security controls around Kapsch RIS-9160 and RIS-9260 RSUs to prevent unauthorized physical access. Implement strict BIOS password policies enforcing complex, unique passwords for Supervisor and User accounts to mitigate brute-force attempts. Where possible, enable account lockout or delay mechanisms after multiple failed login attempts to hinder brute-force attacks. Monitor RSU devices for signs of tampering or unauthorized access. Coordinate with Kapsch TrafficCom for firmware updates or patches addressing this vulnerability and plan timely deployment once available. Consider network segmentation and limiting physical access to RSUs to trusted personnel only. Employ hardware security modules or tamper-evident seals to detect physical interference. Regularly audit BIOS configurations and maintain an inventory of devices and their firmware versions to prioritize remediation efforts. Additionally, integrate RSU security monitoring into broader traffic management cybersecurity frameworks to detect anomalous behavior early.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-02-07T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68adcca5ad5a09ad005926b7

Added to database: 8/26/2025, 3:03:01 PM

Last enriched: 10/22/2025, 3:39:48 PM

Last updated: 11/24/2025, 12:11:48 AM

Views: 67

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats