Description
By making minor configuration changes to the TropOS 4th Gen device, an authenticated user with the ability to run user level shell commands can enable access via secure shell (SSH) to an unrestricted root shell. This is possible through abuse of a particular set of scripts and executables that allow for certain commands to be run as root from an unprivileged context.
INFO
Published Date :
2025-10-28T12:16:36.060Z
Last Modified :
2025-10-28T13:13:02.115Z
Source :
Hitachi Energy
AFFECTED PRODUCTS
The following products are affected by CVE-2025-1037 vulnerability.
| Vendors | Products |
|---|---|
| Hitachienergy |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2025-1037.
CVSS Vulnerability Scoring System
Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Attack Requirements
Privileges Required
User Interaction
VS Confidentiality
VS Integrity
VS Availability
SS Confidentiality
SS Integrity
SS Availability