Kapsch TrafficCom RIS-9160 & RIS-9260 Roadside Units (RSUs) v3.2.0.829.23, v3.8.0.1119.42, and v4.6.0.1211.28 were discovered to lack secure password requirements for its BIOS Supervisor and User accounts, allowing attackers to bypass authentication via a bruteforce attack.
References
| Link | Resource |
|---|---|
| https://cwe.mitre.org/data/definitions/521.html | Technical Description |
| https://phrack.org/issues/72/16_md | Exploit Third Party Advisory |
| https://www.kapsch.net/_Resources/Persistent/3d251a8445e0bf50093903ad70b3dbed34dec7e7/KTC-CVS_RIS-9260_DataSheet.pdf | Broken Link |
| https://www.kapsch.net/_Resources/Persistent/55fb8d0fb279262809eac88d457894db1b3efcd5/Kapsch_RIS-9160_Datasheet_EN.pdf | Product |
| https://www.kapsch.net/en | Product |
| https://www.kapsch.net/en/press/releases/ktc-20200813-pr-en | Product |
Configurations
Configuration 1 (hide)
| AND |
|
Configuration 2 (hide)
| AND |
|
History
22 Oct 2025, 15:15
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.8 |
| References | () https://phrack.org/issues/72/16_md - Exploit, Third Party Advisory |
16 Sep 2025, 19:22
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://cwe.mitre.org/data/definitions/521.html - Technical Description | |
| References | () https://phrack.org/issues/72/16_md - Exploit, Third Party Advisory | |
| References | () https://www.kapsch.net/_Resources/Persistent/3d251a8445e0bf50093903ad70b3dbed34dec7e7/KTC-CVS_RIS-9260_DataSheet.pdf - Broken Link | |
| References | () https://www.kapsch.net/_Resources/Persistent/55fb8d0fb279262809eac88d457894db1b3efcd5/Kapsch_RIS-9160_Datasheet_EN.pdf - Product | |
| References | () https://www.kapsch.net/en - Product | |
| References | () https://www.kapsch.net/en/press/releases/ktc-20200813-pr-en - Product | |
| CPE | cpe:2.3:o:kapsch:ris-9160_firmware:3.2.0.829.23:*:*:*:*:*:*:* cpe:2.3:h:kapsch:ris-9260:-:*:*:*:*:*:*:* cpe:2.3:o:kapsch:ris-9160_firmware:4.6.0.1211.28:*:*:*:*:*:*:* cpe:2.3:o:kapsch:ris-9260_firmware:4.6.0.1211.28:*:*:*:*:*:*:* cpe:2.3:o:kapsch:ris-9260_firmware:3.2.0.829.23:*:*:*:*:*:*:* cpe:2.3:o:kapsch:ris-9160_firmware:3.8.0.1119.42:*:*:*:*:*:*:* cpe:2.3:o:kapsch:ris-9260_firmware:3.8.0.1119.42:*:*:*:*:*:*:* cpe:2.3:h:kapsch:ris-9160:-:*:*:*:*:*:*:* |
|
| First Time |
Kapsch ris-9260
Kapsch ris-9260 Firmware Kapsch ris-9160 Kapsch ris-9160 Firmware Kapsch |
27 Aug 2025, 15:15
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
|
| References | () https://phrack.org/issues/72/16_md - | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
| CWE | CWE-521 |
26 Aug 2025, 15:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-08-26 15:15
Updated : 2025-10-22 15:15
NVD link : CVE-2025-25737
Mitre link : CVE-2025-25737
CVE.ORG link : CVE-2025-25737
JSON object : View
Products Affected
kapsch
- ris-9260
- ris-9160
- ris-9260_firmware
- ris-9160_firmware
CWE
CWE-521
Weak Password Requirements
