By making minor configuration changes to the TropOS 4th Gen device, an authenticated user with the ability to run user level shell commands can enable access via secure shell (SSH) to an unrestricted root shell. This is possible through abuse of a particular set of scripts and executables that allow for certain commands to be run as root from an unprivileged context.
                
            Metrics
Affected Vendors & Products
References
        History
                    Wed, 29 Oct 2025 11:00:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | Hitachienergy Hitachienergy tropos | |
| Vendors & Products | Hitachienergy Hitachienergy tropos | 
Tue, 28 Oct 2025 14:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | ssvc 
 | 
Tue, 28 Oct 2025 12:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Description | By making minor configuration changes to the TropOS 4th Gen device, an authenticated user with the ability to run user level shell commands can enable access via secure shell (SSH) to an unrestricted root shell. This is possible through abuse of a particular set of scripts and executables that allow for certain commands to be run as root from an unprivileged context. | |
| Weaknesses | CWE-269 | |
| References |  | |
| Metrics | cvssV4_0 
 | 
 MITRE
                        MITRE
                    Status: PUBLISHED
Assigner: Hitachi Energy
Published: 2025-10-28T12:16:36.060Z
Updated: 2025-10-28T13:13:02.115Z
Reserved: 2025-02-04T16:13:19.059Z
Link: CVE-2025-1037
 Vulnrichment
                        Vulnrichment
                    Updated: 2025-10-28T13:12:57.438Z
 NVD
                        NVD
                    Status : Awaiting Analysis
Published: 2025-10-28T13:15:56.270
Modified: 2025-10-30T15:05:32.197
Link: CVE-2025-1037
 Redhat
                        Redhat
                    No data.