PT-2025-29125 · Unknown · End-Of-Train +1
Eric Reuter
+1
·
Published
2025-07-10
·
Updated
2025-07-16
·
CVE-2025-1727
8.1
High
Base vector | Vector | AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H |
### Name of the Vulnerable Software and Affected Versions:
End-of-Train (EoT) and Head-of-Train (HoT) devices (affected versions not specified)
### Description:
A critical vulnerability exists in the remote linking protocol used for End-of-Train and Head-of-Train (also known as FRED) devices, which rely on a BCH checksum for packet creation. This allows for the creation of malicious packets with a software-defined radio to issue brake control commands to the EoT device, potentially disrupting operations or overwhelming the brake systems. A similar vulnerability was exploited in Europe in August 2023, causing train disruptions. The vulnerability has been known for approximately 20 years, with researchers raising concerns since 2012. The Association of American Railroads (AAR) plans to replace the outdated protocol with IEEE 802.16t Direct Peer-to-Peer (DPP), with implementation beginning in 2026. Successful exploitation could allow an attacker to send brake control commands to the end-of-train device.
### Recommendations:
At the moment, there is no information about a newer version that contains a fix for this vulnerability.
Weakness Enumeration
Related Identifiers
Affected Products
References · 20
- https://nvd.nist.gov/vuln/detail/CVE-2025-1727 · Security Note
- https://twitter.com/pdejj17567985/status/1945318331852190203 · Twitter Post
- https://twitter.com/Info_Sec_Buzz/status/1945390728173031732 · Twitter Post
- https://twitter.com/dailytechonx/status/1945245741426839624 · Twitter Post
- https://t.me/c/1179006758/5759 · Telegram Post
- https://twitter.com/The_Cyber_News/status/1944998741930598756 · Twitter Post
- https://twitter.com/TweetThreatNews/status/1944819395722666367 · Twitter Post
- https://twitter.com/CVEnew/status/1943668173246800201 · Twitter Post
- https://twitter.com/Ke_Cyber/status/1944420822296240363 · Twitter Post
- https://twitter.com/TylerFumero/status/1944383453354512519 · Twitter Post
- https://reddit.com/r/pwnhub/comments/1lztkye/20yearold_train_hack_vulnerability_finally · Reddit Post
- https://reddit.com/r/CVEWatch/comments/1m0ds56/top_10_trending_cves_15072025 · Reddit Post
- https://twitter.com/securityRSS/status/1944819862548656611 · Twitter Post
- https://twitter.com/0dayPublishing/status/1943346803761418431 · Twitter Post
- https://t.me/c/1129491012/128473 · Telegram Post