CVE-2025-1037
BaseFortify
Publication date: 2025-10-28
Last updated on: 2025-10-30
Assigner: Hitachi Energy
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-269 | The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability allows an authenticated user who can run user-level shell commands on the TropOS 4th Gen device to make minor configuration changes that enable access to an unrestricted root shell via SSH. This is possible because certain scripts and executables can be abused to run commands as root from an unprivileged context.
How can this vulnerability impact me? :
The vulnerability can lead to privilege escalation, allowing an authenticated user with limited access to gain full root access to the device. This can result in unauthorized control over the device, potentially leading to data compromise, system manipulation, or disruption of services.