The protocol used for remote linking over RF for End-of-Train and Head-of-Train (also known as a FRED) relies on a BCH checksum for packet creation. It is possible to create these EoT and HoT packets with a software defined radio and issue brake control commands to the EoT device, disrupting operations or potentially overwhelming the brake systems.
History

Wed, 16 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.0002}

epss

{'score': 0.00024}


Fri, 11 Jul 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 11 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.0002}


Thu, 10 Jul 2025 23:15:00 +0000

Type Values Removed Values Added
Description The protocol used for remote linking over RF for End-of-Train and Head-of-Train (also known as a FRED) relies on a BCH checksum for packet creation. It is possible to create these EoT and HoT packets with a software defined radio and issue brake control commands to the EoT device, disrupting operations or potentially overwhelming the brake systems.
Title End-of-Train and Head-of-Train Remote Linking Protocol Weak Authentication
Weaknesses CWE-1390
References
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H'}

cvssV4_0

{'score': 7.2, 'vector': 'CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published: 2025-07-10T22:59:34.802Z

Updated: 2025-07-11T14:06:28.251Z

Reserved: 2025-02-26T20:19:11.460Z

Link: CVE-2025-1727

cve-icon Vulnrichment

Updated: 2025-07-11T14:06:25.740Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-07-10T23:15:27.600

Modified: 2025-07-15T13:14:49.980

Link: CVE-2025-1727

cve-icon Redhat

No data.