Filtered by vendor Kapsch
Subscriptions
Filtered by product Ris-9160
Subscriptions
Total
5 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2025-25737 | 1 Kapsch | 2 Ris-9160, Ris-9260 | 2025-08-27 | 9.8 Critical |
Kapsch TrafficCom RIS-9160 & RIS-9260 Roadside Units (RSUs) v3.2.0.829.23, v3.8.0.1119.42, and v4.6.0.1211.28 were discovered to lack secure password requirements for its BIOS Supervisor and User accounts, allowing attackers to bypass authentication via a bruteforce attack. | ||||
CVE-2025-25734 | 1 Kapsch | 2 Ris-9160, Ris-9260 | 2025-08-27 | 9.8 Critical |
Kapsch TrafficCom RIS-9160 & RIS-9260 Roadside Units (RSUs) v3.2.0.829.23, v3.8.0.1119.42, and v4.6.0.1211.28 was discovered to contain an unauthenticated EFI shell which allows attackers to execute arbitrary code or escalate privileges during the boot process. | ||||
CVE-2025-25735 | 1 Kapsch | 2 Ris-9160, Ris-9260 | 2025-08-27 | 7.5 High |
Kapsch TrafficCom RIS-9160 & RIS-9260 Roadside Units (RSUs) v3.2.0.829.23, v3.8.0.1119.42, and v4.6.0.1211.28 were discovered to lack SPI Protected Range Registers (PRRs), allowing attackers with software running on the system to modify SPI flash in real-time. | ||||
CVE-2025-25732 | 1 Kapsch | 2 Ris-9160, Ris-9260 | 2025-08-27 | 6.5 Medium |
Incorrect access control in the EEPROM component of Kapsch TrafficCom RIS-9160 & RIS-9260 Roadside Units (RSUs) v3.2.0.829.23, v3.8.0.1119.42, and v4.6.0.1211.28 allows attackers to replace password hashes stored in the EEPROM with hashes of their own, leading to the escalation of privileges to root. | ||||
CVE-2025-25733 | 1 Kapsch | 2 Ris-9160, Ris-9260 | 2025-08-27 | 5.3 Medium |
Incorrect access control in the SPI Flash Chip of Kapsch TrafficCom RIS-9160 & RIS-9260 Roadside Units (RSUs) v3.2.0.829.23, v3.8.0.1119.42, and v4.6.0.1211.28 allows physically proximate attackers to arbitrarily modify SPI flash regions, leading to a degradation of the security posture of the device. |
Page 1 of 1.