By making minor configuration changes to the TropOS 4th Gen device, an authenticated user with the ability to run user level shell commands can enable access via secure shell (SSH) to an unrestricted root shell. This is possible through abuse of a particular set of scripts and executables that allow for certain commands to be run as root from an unprivileged context.
Metrics
Affected Vendors & Products
References
History
Wed, 29 Oct 2025 11:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Hitachienergy
Hitachienergy tropos |
|
| Vendors & Products |
Hitachienergy
Hitachienergy tropos |
Tue, 28 Oct 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 28 Oct 2025 12:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | By making minor configuration changes to the TropOS 4th Gen device, an authenticated user with the ability to run user level shell commands can enable access via secure shell (SSH) to an unrestricted root shell. This is possible through abuse of a particular set of scripts and executables that allow for certain commands to be run as root from an unprivileged context. | |
| Weaknesses | CWE-269 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: Hitachi Energy
Published: 2025-10-28T12:16:36.060Z
Updated: 2025-10-28T13:13:02.115Z
Reserved: 2025-02-04T16:13:19.059Z
Link: CVE-2025-1037
Updated: 2025-10-28T13:12:57.438Z
Status : Awaiting Analysis
Published: 2025-10-28T13:15:56.270
Modified: 2025-10-30T15:05:32.197
Link: CVE-2025-1037
No data.