CVE-2025-1727
BaseFortify
Publication date: 2025-07-10
Last updated on: 2025-07-15
Assigner: ICS-CERT
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-1390 | The product uses an authentication mechanism to restrict access to specific users or identities, but the mechanism does not sufficiently prove that the claimed identity is correct. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves the protocol used for remote linking over RF for End-of-Train (EoT) and Head-of-Train (HoT) devices, which relies on a BCH checksum for packet creation. An attacker can use a software defined radio to create EoT and HoT packets and issue unauthorized brake control commands to the EoT device, potentially disrupting train operations or overwhelming the brake systems.
How can this vulnerability impact me? :
The vulnerability can impact you by allowing an attacker to disrupt train operations through unauthorized brake control commands. This could lead to operational disruptions or potentially overwhelming the brake systems, posing safety risks and operational challenges.