Metrics
Affected Vendors & Products
Wed, 16 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Fri, 11 Jul 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 11 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
Thu, 10 Jul 2025 23:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The protocol used for remote linking over RF for End-of-Train and Head-of-Train (also known as a FRED) relies on a BCH checksum for packet creation. It is possible to create these EoT and HoT packets with a software defined radio and issue brake control commands to the EoT device, disrupting operations or potentially overwhelming the brake systems. | |
| Title | End-of-Train and Head-of-Train Remote Linking Protocol Weak Authentication | |
| Weaknesses | CWE-1390 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: icscert
Published: 2025-07-10T22:59:34.802Z
Updated: 2025-07-11T14:06:28.251Z
Reserved: 2025-02-26T20:19:11.460Z
Link: CVE-2025-1727
Updated: 2025-07-11T14:06:25.740Z
Status : Awaiting Analysis
Published: 2025-07-10T23:15:27.600
Modified: 2025-07-15T13:14:49.980
Link: CVE-2025-1727
No data.