CVE-2025-25734

6.8 MEDIUM

📋 TL;DR

Kapsch TrafficCom RIS-9160 and RIS-9260 Roadside Units contain an unauthenticated EFI shell accessible during boot, allowing attackers to execute arbitrary code or escalate privileges. This affects RSUs running vulnerable firmware versions, potentially compromising traffic management systems.

💻 Affected Systems

Products:
  • Kapsch TrafficCom RIS-9160 Roadside Unit
  • Kapsch TrafficCom RIS-9260 Roadside Unit
Versions: v3.2.0.829.23, v3.8.0.1119.42, v4.6.0.1211.28
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in default firmware configurations. Requires access during boot process (physical or via network if boot process is accessible).

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attackers to install persistent malware, disrupt traffic management systems, or use RSUs as footholds into connected infrastructure networks.

🟠

Likely Case

Local attackers gaining administrative access to modify system configurations, install unauthorized software, or disrupt RSU operations.

🟢

If Mitigated

Limited impact if physical access controls prevent unauthorized personnel from accessing devices during boot process.

🌐 Internet-Facing: LOW - Requires physical or local network access to exploit during boot process.
🏢 Internal Only: MEDIUM - Internal attackers with physical access or network proximity could exploit during system restarts.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires access during the boot process, which may involve physical access or network access if boot services are exposed. No authentication is required once EFI shell is accessible.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check with Kapsch for patched firmware versions

Vendor Advisory: https://www.kapsch.net/en

Restart Required: Yes

Instructions:

1. Contact Kapsch TrafficCom for patched firmware versions. 2. Backup current configuration. 3. Apply firmware update following vendor instructions. 4. Verify EFI shell is no longer accessible without authentication.

🔧 Temporary Workarounds

Physical Access Controls

all

Restrict physical access to RSU devices to prevent unauthorized personnel from accessing boot process.

Secure Boot Configuration

all

Configure secure boot options if available in firmware to restrict EFI shell access.

🧯 If You Can't Patch

  • Implement strict physical security controls around RSU installations
  • Monitor for unauthorized system restarts or boot process access attempts

🔍 How to Verify

Check if Vulnerable:

Attempt to access EFI shell during system boot by pressing appropriate key combination (typically ESC, F2, or DEL) during POST. If shell appears without authentication prompt, system is vulnerable.

Check Version:

Check firmware version through device web interface or console: Typically available in System > About or Status pages.

Verify Fix Applied:

After patching, attempt to access EFI shell during boot. System should require authentication or prevent access entirely.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected system reboots
  • Boot process interruptions
  • EFI shell access logs if available

Network Indicators:

  • Unusual network traffic during boot process
  • Unexpected PXE or network boot attempts

SIEM Query:

Search for system reboot events outside maintenance windows combined with physical access logs to RSU locations.

🔗 References

📤 Share & Export