Filtered by vendor Kapsch Subscriptions
Filtered by product Ris-9160 Subscriptions
Total 5 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2025-25737 1 Kapsch 2 Ris-9160, Ris-9260 2025-08-27 9.8 Critical
Kapsch TrafficCom RIS-9160 & RIS-9260 Roadside Units (RSUs) v3.2.0.829.23, v3.8.0.1119.42, and v4.6.0.1211.28 were discovered to lack secure password requirements for its BIOS Supervisor and User accounts, allowing attackers to bypass authentication via a bruteforce attack.
CVE-2025-25734 1 Kapsch 2 Ris-9160, Ris-9260 2025-08-27 9.8 Critical
Kapsch TrafficCom RIS-9160 & RIS-9260 Roadside Units (RSUs) v3.2.0.829.23, v3.8.0.1119.42, and v4.6.0.1211.28 was discovered to contain an unauthenticated EFI shell which allows attackers to execute arbitrary code or escalate privileges during the boot process.
CVE-2025-25735 1 Kapsch 2 Ris-9160, Ris-9260 2025-08-27 7.5 High
Kapsch TrafficCom RIS-9160 & RIS-9260 Roadside Units (RSUs) v3.2.0.829.23, v3.8.0.1119.42, and v4.6.0.1211.28 were discovered to lack SPI Protected Range Registers (PRRs), allowing attackers with software running on the system to modify SPI flash in real-time.
CVE-2025-25732 1 Kapsch 2 Ris-9160, Ris-9260 2025-08-27 6.5 Medium
Incorrect access control in the EEPROM component of Kapsch TrafficCom RIS-9160 & RIS-9260 Roadside Units (RSUs) v3.2.0.829.23, v3.8.0.1119.42, and v4.6.0.1211.28 allows attackers to replace password hashes stored in the EEPROM with hashes of their own, leading to the escalation of privileges to root.
CVE-2025-25733 1 Kapsch 2 Ris-9160, Ris-9260 2025-08-27 5.3 Medium
Incorrect access control in the SPI Flash Chip of Kapsch TrafficCom RIS-9160 & RIS-9260 Roadside Units (RSUs) v3.2.0.829.23, v3.8.0.1119.42, and v4.6.0.1211.28 allows physically proximate attackers to arbitrarily modify SPI flash regions, leading to a degradation of the security posture of the device.