An attacker may execute arbitrary code with SYSTEM privileges if a user is tricked or directed to place a crafted file into the vulnerable directory.
This issue affects TETRA connectivity Server: 7.0.
Vulnerability fix is available and delivered to impacted customers.
Project Subscriptions
No data.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
| Link | Providers |
|---|---|
| https://cwe.mitre.org/data/definitions/276.html |
|
Fri, 03 Apr 2026 14:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 03 Apr 2026 07:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Incorrect Default Permissions vulnerability in AIRBUS PSS TETRA Connectivity Server on Windows Server OS allows Privilege Abuse. An attacker may execute arbitrary code with SYSTEM privileges if a user is tricked or directed to place a crafted file into the vulnerable directory. This issue affects TETRA connectivity Server: 7.0. Vulnerability fix is available and delivered to impacted customers. | |
| Title | Local privilege escalation in Windows Server OS through installed Tetra Connectivity Server (TCS) | |
| Weaknesses | CWE-276 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: airbus
Published:
Updated: 2026-04-03T12:16:42.627Z
Reserved: 2025-07-02T14:50:55.096Z
Link: CVE-2025-7024
Updated: 2026-04-03T12:16:35.708Z
Status : Awaiting Analysis
Published: 2026-04-03T08:16:17.290
Modified: 2026-04-03T16:10:23.730
Link: CVE-2025-7024
No data.
OpenCVE Enrichment
No data.