CVSS Vector
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Lifecycle Timeline
3Description
Incorrect Default Permissions vulnerability in AIRBUS PSS TETRA Connectivity Server on Windows Server OS allows Privilege Abuse. An attacker may execute arbitrary code with SYSTEM privileges if a user is tricked or directed to place a crafted file into the vulnerable directory. This issue affects TETRA connectivity Server: 7.0. Vulnerability fix is available and delivered to impacted customers.
Analysis
AIRBUS TETRA Connectivity Server 7.0 on Windows Server allows privilege escalation to SYSTEM via incorrect default directory permissions (CWE-276), enabling local authenticated attackers to execute arbitrary code by placing a crafted file in a vulnerable directory with user interaction. The vulnerability affects TETRA Connectivity Server version 7.0, with patches available for versions 8.0 and 9.0. No public exploit code or active exploitation in the wild has been identified at time of analysis.
Technical Context
This vulnerability stems from improper file system permissions on the Windows Server OS implementation of AIRBUS TETRA Connectivity Server. CWE-276 (Incorrect Default Permissions) describes a situation where a software component creates or uses a file without setting restrictive permissions, allowing unprivileged or less-privileged users to read, modify, or execute sensitive files. In this case, the TETRA Connectivity Server's installation directory or service directories are world-writable or writable by low-privileged users, permitting placement of crafted executables or DLL files that are subsequently executed with SYSTEM privileges. This is a classic Windows privilege escalation vector exploiting default NTFS permissions on application directories.
Affected Products
AIRBUS TETRA Connectivity Server (TCS) version 7.0 is confirmed vulnerable per the official description and EUVD-2025-209201. CPE identifier cpe:2.3:a:airbus:tetra_connectivity_server_(tcs):*:*:*:*:*:*:*:* covers the product family. ENISA EUVD data indicates that patched versions are available: TETRA Connectivity Server 8.0 and 9.0 include fixes. The vulnerability is specific to Windows Server OS deployments of TCS.
Remediation
Vendor-released patch: Upgrade TETRA Connectivity Server to version 8.0 or later, which includes the corrective fix. Organizations unable to upgrade immediately should restrict file system permissions on the TCS installation and service directories to prevent unprivileged users from writing executable or library files. Apply principle of least privilege to directory ACLs, ensuring only SYSTEM and the TCS service account have write access. Monitor for unauthorized file creation attempts in TCS directories. Coordinate with AIRBUS support (per ENISA EUVD-2025-209201) to obtain and validate the patch delivery for your environment.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-209201