CVE-2025-25735

4.6 MEDIUM

📋 TL;DR

This vulnerability allows attackers with software access on Kapsch TrafficCom RIS-9160 and RIS-9260 Roadside Units to modify SPI flash memory in real-time due to missing SPI Protected Range Registers. This affects organizations using these specific RSU versions for traffic management systems. Attackers could potentially alter device firmware or configuration without proper hardware protections.

💻 Affected Systems

Products:
  • Kapsch TrafficCom RIS-9160 Roadside Unit
  • Kapsch TrafficCom RIS-9260 Roadside Unit
Versions: v3.2.0.829.23, v3.8.0.1119.42, v4.6.0.1211.28
Operating Systems: Embedded system firmware
Default Config Vulnerable: ⚠️ Yes
Notes: All devices running affected firmware versions are vulnerable by default. Requires software access on the device to exploit.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker with software access could permanently modify device firmware, install persistent malware, disable safety features, or cause traffic system malfunctions leading to safety hazards.

🟠

Likely Case

Malicious insiders or compromised software could modify configuration settings, disable logging, or install backdoors for future access.

🟢

If Mitigated

With proper access controls and monitoring, impact is limited to authorized users making unauthorized modifications, which could still cause service disruption.

🌐 Internet-Facing: LOW - These are roadside units typically not directly internet-facing, though connected to traffic management networks.
🏢 Internal Only: MEDIUM - Requires software access on the device, so risk is higher for insiders or compromised internal systems.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires software execution on the device. No public exploit code available. Attackers need to understand SPI flash architecture and have software access.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check with Kapsch for updated firmware versions

Vendor Advisory: https://www.kapsch.net/en

Restart Required: Yes

Instructions:

1. Contact Kapsch TrafficCom support for patched firmware versions. 2. Backup current configuration. 3. Apply firmware update following vendor procedures. 4. Verify SPI PRR protections are enabled. 5. Test functionality before production deployment.

🔧 Temporary Workarounds

Restrict software access

all

Limit software installation and execution privileges on RSU devices to authorized personnel only.

Network segmentation

all

Isolate RSU devices on separate network segments with strict access controls.

🧯 If You Can't Patch

  • Implement strict access controls to prevent unauthorized software installation on RSU devices
  • Deploy network monitoring and anomaly detection for RSU communications and configuration changes

🔍 How to Verify

Check if Vulnerable:

Check device firmware version via vendor management interface or console. If version matches affected list, device is vulnerable.

Check Version:

Use vendor-specific CLI or management interface commands (consult Kapsch documentation)

Verify Fix Applied:

After patching, verify firmware version is updated and test SPI flash write protections through vendor diagnostic tools.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected firmware or configuration changes
  • Unauthorized access attempts to device management interfaces
  • SPI flash write operations outside normal maintenance windows

Network Indicators:

  • Unusual traffic patterns to/from RSU devices
  • Unexpected firmware update attempts
  • Configuration changes outside maintenance schedules

SIEM Query:

Example: (device_type:RSU AND (event_type:firmware_change OR event_type:config_change) AND NOT user:authorized_maintenance)

🔗 References

📤 Share & Export