An attacker may execute arbitrary code with SYSTEM privileges if a user is tricked or directed to place a crafted file into the vulnerable directory.
This issue affects TETRA connectivity Server: 7.0.
Vulnerability fix is available and delivered to impacted customers.
Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
| Link | Providers |
|---|---|
| https://cwe.mitre.org/data/definitions/276.html |
|
Fri, 03 Apr 2026 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Airbus
Airbus tetra Connectivity Server (tcs) |
|
| Vendors & Products |
Airbus
Airbus tetra Connectivity Server (tcs) |
Fri, 03 Apr 2026 14:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 03 Apr 2026 07:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Incorrect Default Permissions vulnerability in AIRBUS PSS TETRA Connectivity Server on Windows Server OS allows Privilege Abuse. An attacker may execute arbitrary code with SYSTEM privileges if a user is tricked or directed to place a crafted file into the vulnerable directory. This issue affects TETRA connectivity Server: 7.0. Vulnerability fix is available and delivered to impacted customers. | |
| Title | Local privilege escalation in Windows Server OS through installed Tetra Connectivity Server (TCS) | |
| Weaknesses | CWE-276 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: airbus
Published:
Updated: 2026-04-03T12:16:42.627Z
Reserved: 2025-07-02T14:50:55.096Z
Link: CVE-2025-7024
Updated: 2026-04-03T12:16:35.708Z
Status : Awaiting Analysis
Published: 2026-04-03T08:16:17.290
Modified: 2026-04-03T16:10:23.730
Link: CVE-2025-7024
No data.
OpenCVE Enrichment
Updated: 2026-04-03T21:17:02Z