Kapsch TrafficCom RIS-9160 & RIS-9260 Roadside Units (RSUs) v3.2.0.829.23, v3.8.0.1119.42, and v4.6.0.1211.28 were discovered to lack secure password requirements for its BIOS Supervisor and User accounts, allowing attackers to bypass authentication via a bruteforce attack.
References
| Link | Resource |
|---|---|
| https://cwe.mitre.org/data/definitions/521.html | Technical Description |
| https://phrack.org/issues/72/16_md | Exploit Third Party Advisory |
| https://www.kapsch.net/_Resources/Persistent/3d251a8445e0bf50093903ad70b3dbed34dec7e7/KTC-CVS_RIS-9260_DataSheet.pdf | Broken Link |
| https://www.kapsch.net/_Resources/Persistent/55fb8d0fb279262809eac88d457894db1b3efcd5/Kapsch_RIS-9160_Datasheet_EN.pdf | Product |
| https://www.kapsch.net/en | Product |
| https://www.kapsch.net/en/press/releases/ktc-20200813-pr-en | Product |
Configurations
Configuration 1 (hide)
| AND |
|
Configuration 2 (hide)
| AND |
|
History
No history.
Information
Published : 2025-08-26 15:15
Updated : 2025-10-22 15:15
NVD link : CVE-2025-25737
Mitre link : CVE-2025-25737
CVE.ORG link : CVE-2025-25737
JSON object : View
Products Affected
kapsch
- ris-9260_firmware
- ris-9260
- ris-9160_firmware
- ris-9160
CWE
CWE-521
Weak Password Requirements
