6.8

CVE-2025-25734

Exploit
Kapsch TrafficCom RIS-9160 & RIS-9260 Roadside Units (RSUs) v3.2.0.829.23, v3.8.0.1119.42, and v4.6.0.1211.28 was discovered to contain an unauthenticated EFI shell which allows attackers to execute arbitrary code or escalate privileges during the boot process.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
KapschRis-9160 Firmware Version3.2.0.829.23
   KapschRis-9160 Version-
KapschRis-9160 Firmware Version3.8.0.1119.42
   KapschRis-9160 Version-
KapschRis-9160 Firmware Version4.6.0.1211.28
   KapschRis-9160 Version-
KapschRis-9260 Firmware Version3.2.0.829.23
   KapschRis-9260 Version-
KapschRis-9260 Firmware Version3.8.0.1119.42
   KapschRis-9260 Version-
KapschRis-9260 Firmware Version4.6.0.1211.28
   KapschRis-9260 Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.1% 0.273
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
134c704f-9b21-4f2e-91b3-4a467353bcc0 6.8 0.9 5.9
CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CWE-1233 Security-Sensitive Hardware Controls with Missing Lock Bit Protection

The product uses a register lock bit protection mechanism, but it does not ensure that the lock bit prevents modification of system registers or controls that perform changes to important hardware system configuration.

CWE-284 Improper Access Control

The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.