CVE-2025-25734

Kapsch TrafficCom RIS-9160 & RIS-9260 Roadside Units (RSUs) v3.2.0.829.23, v3.8.0.1119.42, and v4.6.0.1211.28 was discovered to contain an unauthenticated EFI shell which allows attackers to execute arbitrary code or escalate privileges during the boot process.
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:o:kapsch:ris-9160_firmware:3.2.0.829.23:*:*:*:*:*:*:*
cpe:2.3:o:kapsch:ris-9160_firmware:3.8.0.1119.42:*:*:*:*:*:*:*
cpe:2.3:o:kapsch:ris-9160_firmware:4.6.0.1211.28:*:*:*:*:*:*:*
cpe:2.3:h:kapsch:ris-9160:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
OR cpe:2.3:o:kapsch:ris-9260_firmware:3.2.0.829.23:*:*:*:*:*:*:*
cpe:2.3:o:kapsch:ris-9260_firmware:3.8.0.1119.42:*:*:*:*:*:*:*
cpe:2.3:o:kapsch:ris-9260_firmware:4.6.0.1211.28:*:*:*:*:*:*:*
cpe:2.3:h:kapsch:ris-9260:-:*:*:*:*:*:*:*

History

16 Sep 2025, 19:37

Type Values Removed Values Added
CPE cpe:2.3:o:kapsch:ris-9160_firmware:3.2.0.829.23:*:*:*:*:*:*:*
cpe:2.3:h:kapsch:ris-9260:-:*:*:*:*:*:*:*
cpe:2.3:o:kapsch:ris-9160_firmware:4.6.0.1211.28:*:*:*:*:*:*:*
cpe:2.3:o:kapsch:ris-9260_firmware:4.6.0.1211.28:*:*:*:*:*:*:*
cpe:2.3:o:kapsch:ris-9260_firmware:3.2.0.829.23:*:*:*:*:*:*:*
cpe:2.3:o:kapsch:ris-9160_firmware:3.8.0.1119.42:*:*:*:*:*:*:*
cpe:2.3:o:kapsch:ris-9260_firmware:3.8.0.1119.42:*:*:*:*:*:*:*
cpe:2.3:h:kapsch:ris-9160:-:*:*:*:*:*:*:*
First Time Kapsch ris-9260
Kapsch ris-9260 Firmware
Kapsch ris-9160
Kapsch ris-9160 Firmware
Kapsch
References () https://cwe.mitre.org/data/definitions/1233.html - () https://cwe.mitre.org/data/definitions/1233.html - Technical Description
References () https://phrack.org/issues/72/16_md - () https://phrack.org/issues/72/16_md - Exploit, Third Party Advisory
References () https://www.kapsch.net/_Resources/Persistent/3d251a8445e0bf50093903ad70b3dbed34dec7e7/KTC-CVS_RIS-9260_DataSheet.pdf - () https://www.kapsch.net/_Resources/Persistent/3d251a8445e0bf50093903ad70b3dbed34dec7e7/KTC-CVS_RIS-9260_DataSheet.pdf - Broken Link
References () https://www.kapsch.net/_Resources/Persistent/55fb8d0fb279262809eac88d457894db1b3efcd5/Kapsch_RIS-9160_Datasheet_EN.pdf - () https://www.kapsch.net/_Resources/Persistent/55fb8d0fb279262809eac88d457894db1b3efcd5/Kapsch_RIS-9160_Datasheet_EN.pdf - Product
References () https://www.kapsch.net/en - () https://www.kapsch.net/en - Product
References () https://www.kapsch.net/en/press/releases/ktc-20200813-pr-en - () https://www.kapsch.net/en/press/releases/ktc-20200813-pr-en - Product

27 Aug 2025, 15:15

Type Values Removed Values Added
Summary
  • (es) Se descubrió que Kapsch TrafficCom RIS-9160 & RIS-9260 Roadside Units (RSUs) v3.2.0.829.23, v3.8.0.1119.42, y v4.6.0.1211.28 contienen un shell EFI no autenticado que permite a los atacantes ejecutar código arbitrario o escalar privilegios durante el proceso de arranque.
CWE CWE-1233
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8

26 Aug 2025, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-08-26 15:15

Updated : 2025-09-16 19:37


NVD link : CVE-2025-25734

Mitre link : CVE-2025-25734

CVE.ORG link : CVE-2025-25734


JSON object : View

Products Affected

kapsch

  • ris-9260
  • ris-9160
  • ris-9260_firmware
  • ris-9160_firmware
CWE
CWE-1233

Security-Sensitive Hardware Controls with Missing Lock Bit Protection