A low privileged local attacker can leverage insecure permissions via SSH on the affected devices to escalate privileges to root.
https://certvde.com/de/advisories/VDE-2025-014
Source: Mitre, NVD
Published: 2025-07-08
Updated: 2025-07-11
Base Score: 6.8
Vector: CVSS2#AV:L/AC:L/Au:S/C:C/I:C/A:C
Severity: Medium
Base Score: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Severity: High
EPSS: 0.0001