Remote Linking Vulnerability in End-of-Train and Head-of-Train Systems by CISA
CVE-2025-1727
Key Information:
- Vendor
- CVE Published:
- 10 July 2025
Badges
What is CVE-2025-1727?
CVE-2025-1727 is a remote linking vulnerability affecting the End-of-Train (EoT) and Head-of-Train (HoT) systems, which utilize a specific remote linking protocol designed for efficient communication over radio frequencies. This protocol, essential for managing and monitoring train operations, employs a BCH checksum method for the creation of packets. The vulnerability allows malicious actors to exploit this protocol using software-defined radios to create unauthorized EoT and HoT packets. By doing so, attackers can issue brake control commands to the EoT device, leading to possible disruptions in operations or even overwhelming the brake systems. Such a compromise could endanger the safety and functionality of railway operations, posing significant risks to both assets and personnel.
Potential Impact of CVE-2025-1727
-
Operational Disruption: The ability to manipulate brake control commands can result in severe operational disturbances, potentially halting train services and affecting schedules. This disruption can lead to significant economic losses and operational inefficiencies.
-
Safety Risks: Unauthorized control over braking systems directly endangers the safety of rail transport. The potential for abrupt stops or failure to respond to braking commands could cause accidents, posing serious risks to passengers and railway personnel.
-
System Overload: Attackers could leverage this vulnerability to overwhelm the brake systems, leading to equipment failures or malfunctions. Such overload scenarios could necessitate extensive repairs or replacements, thereby increasing operational costs and affecting service reliability.
Affected Version(s)
End-of-Train and Head-of-Train remote linking protocol All versions
News Articles
CVE-2025-1727 : The protocol used for remote linking over RF for End-of-Train and Head-of-Train
CVE-2025-1727 : The protocol used for remote linking over RF for End-of-Train and Head-of-Train (also known as a FRED) relies on a BCH checksum for packet creation.
6 hours ago
References
CVSS V4
Timeline
- π°
First article discovered by CVE Details
- π₯
Vulnerability reached the number 1 worldwide trending spot
- π
Vulnerability started trending
Vulnerability published
Vulnerability Reserved