Incorrect access control in the EEPROM component of Kapsch TrafficCom RIS-9160 & RIS-9260 Roadside Units (RSUs) v3.2.0.829.23, v3.8.0.1119.42, and v4.6.0.1211.28 allows attackers to replace password hashes stored in the EEPROM with hashes of their own, leading to the escalation of privileges to root.
References
| Link | Resource |
|---|---|
| https://cwe.mitre.org/data/definitions/922.html | Technical Description |
| https://phrack.org/issues/72/16_md | Exploit Third Party Advisory |
| https://www.kapsch.net/_Resources/Persistent/3d251a8445e0bf50093903ad70b3dbed34dec7e7/KTC-CVS_RIS-9260_DataSheet.pdf | Broken Link |
| https://www.kapsch.net/_Resources/Persistent/55fb8d0fb279262809eac88d457894db1b3efcd5/Kapsch_RIS-9160_Datasheet_EN.pdf | Product |
| https://www.kapsch.net/en | Product |
| https://www.kapsch.net/en/press/releases/ktc-20200813-pr-en | Product |
Configurations
Configuration 1 (hide)
| AND |
|
Configuration 2 (hide)
| AND |
|
History
No history.
Information
Published : 2025-08-26 15:15
Updated : 2025-10-22 15:15
NVD link : CVE-2025-25732
Mitre link : CVE-2025-25732
CVE.ORG link : CVE-2025-25732
JSON object : View
Products Affected
kapsch
- ris-9260_firmware
- ris-9260
- ris-9160_firmware
- ris-9160
CWE
CWE-922
Insecure Storage of Sensitive Information
