- What is the severity of CVE-2025-1727?
- CVE-2025-1727 has been scored as a high severity vulnerability.
- How to fix CVE-2025-1727?
- As a workaround for remediating CVE-2025-1727: The Association of American Railroads (AAR) is pursuing new equipment and protocols which should replace traditional End-of-Train and Head-of-Train devices. The standards committees involved in these updates are aware of the vulnerability and are investigating mitigating solutions. The AAR Railroad Electronics Standards Committee (RESC) maintains this protocol which is used by multiple manufacturers across the industry, including Hitachi Rail STS USA, Wabtec, Siemens, and others. Users of EoT/HoT devices are recommended to contact their own device manufacturers with questions.
- Is CVE-2025-1727 being actively exploited in the wild?
- As for now, there are no information to confirm that CVE-2025-1727 is being actively exploited. According to its EPSS score, there is a ~0% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
- What software or system is affected by CVE-2025-1727?
- CVE-2025-1727 affects End-of-Train and Head-of-Train remote linking protocol End-of-Train and Head-of-Train remote linking protocol.