CVE-2025-7024
Received Received - Intake
Incorrect Default Permissions in AIRBUS TETRA Server Enables Privilege Abuse

Publication date: 2026-04-03

Last updated on: 2026-04-03

Assigner: Airbus

Description
Incorrect Default Permissions vulnerability in AIRBUS PSS TETRA Connectivity Server on Windows Server OS allows Privilege Abuse. An attacker may execute arbitrary code with SYSTEM privileges if a user is tricked or directed to place a crafted file into the vulnerable directory. This issue affects TETRA connectivity Server: 7.0. Vulnerability fix is available and delivered to impacted customers.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-03
Last Modified
2026-04-03
Generated
2026-05-07
AI Q&A
2026-04-03
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
airbus tetra_connectivity_server 7.0
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-276 During installation, installed file permissions are set to allow anyone to modify those files.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2025-7024 is an Incorrect Default Permissions vulnerability found in the AIRBUS PSS TETRA Connectivity Server running on Windows Server OS. It occurs because the software sets file or directory permissions too permissively during installation, allowing unauthorized users to modify or place crafted files in sensitive directories.

An attacker can exploit this vulnerability by tricking or directing a user to place a specially crafted file into the vulnerable directory, which then allows the attacker to execute arbitrary code with SYSTEM-level privileges.

This vulnerability is related to CWE-276, which involves improper default permissions that violate confidentiality and integrity by allowing unauthorized modification or reading of application data.


How can this vulnerability impact me? :

The vulnerability can lead to privilege abuse where an attacker gains SYSTEM-level access on the affected server.

This means an attacker could execute arbitrary code with the highest system privileges, potentially leading to full system compromise, unauthorized data access, modification, or disruption of services.

Because the permissions are set incorrectly by default, it increases the risk that unauthorized users can manipulate critical files or resources, undermining system confidentiality, integrity, and availability.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

Detection of this vulnerability involves verifying insecure or incorrect default permissions on files or directories related to the AIRBUS PSS TETRA Connectivity Server.

Common detection methods include using host-based vulnerability scanners and configuration checkers to verify system and file permissions.

Static and dynamic analysis techniques can also be used, such as automated or manual inspection of file permissions and monitored execution to detect permission-related vulnerabilities.

  • On Windows systems, use commands like 'icacls <directory_or_file>' to view the permissions of the vulnerable directory or files.
  • Use PowerShell commands such as 'Get-Acl <path>' to retrieve access control lists and check for overly permissive settings.
  • Employ vulnerability scanners or configuration management tools that can audit file and directory permissions automatically.

What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps focus on correcting the default permissions to follow the principle of least privilege.

Restrict file and directory permissions so that only authorized users and system processes have write or modify access to the vulnerable directories.

Implement separation of privilege and compartmentalization to create clear trust boundaries, preventing unauthorized users from placing crafted files into sensitive directories.

Apply the available vulnerability fix or patch provided by the vendor to address the issue.

Regularly audit permissions and monitor for suspicious file modifications or placements in the vulnerable directories.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

CVE-2025-7024 involves incorrect default permissions that allow unauthorized modification or execution of files with SYSTEM privileges, which can lead to breaches of confidentiality and integrity.

Such breaches can negatively impact compliance with common standards and regulations like GDPR and HIPAA, which require strict controls over data confidentiality, integrity, and access permissions.

The vulnerability highlights the importance of applying the principle of least privilege and proper access control, which are fundamental requirements in many security frameworks and regulatory standards.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart