CVE Vulnerabilities

CVE-2025-25737

Weak Password Requirements

Published: Aug 26, 2025 | Modified: Sep 16, 2025
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu

Kapsch TrafficCom RIS-9160 & RIS-9260 Roadside Units (RSUs) v3.2.0.829.23, v3.8.0.1119.42, and v4.6.0.1211.28 were discovered to lack secure password requirements for its BIOS Supervisor and User accounts, allowing attackers to bypass authentication via a bruteforce attack.

Weakness

The product does not require that users should have strong passwords, which makes it easier for attackers to compromise user accounts.

Affected Software

Name Vendor Start Version End Version
Ris-9160_firmware Kapsch 3.2.0.829.23 (including) 3.2.0.829.23 (including)
Ris-9160_firmware Kapsch 3.8.0.1119.42 (including) 3.8.0.1119.42 (including)
Ris-9160_firmware Kapsch 4.6.0.1211.28 (including) 4.6.0.1211.28 (including)

Potential Mitigations

  • A product’s design should require adherance to an appropriate password policy. Specific password requirements depend strongly on contextual factors, but it is recommended to contain the following attributes:

  • Depending on the threat model, the password policy may include several additional attributes.

  • See NIST 800-63B [REF-1053] for further information on password requirements.

References