AIRBUS PSS TETRA Connectivity Server Privilege Escalation via Incorrect Permissions
AIRBUS PSS TETRA Connectivity Server version 7.0 on Windows Server is vulnerable to incorrect default permissions, allowing local privilege escalation to SYSTEM by placing a malicious file in a specific directory.
AIRBUS PSS TETRA Connectivity Server version 7.0 running on Windows Server operating systems is susceptible to a privilege escalation vulnerability (CVE-2025-7024) due to incorrect default permissions. An attacker, with low privileges, can exploit this vulnerability to execute arbitrary code with SYSTEM privileges. The attack requires a user to be tricked or directed into placing a crafted file into a specific, vulnerable directory within the TETRA Connectivity Server installation. A fix is available and has been delivered to impacted customers. This vulnerability poses a significant risk to organizations using the affected software, as successful exploitation could lead to complete system compromise.
Attack Chain
- Attacker gains initial low-privilege access to the Windows Server system.
- Attacker identifies the vulnerable directory within the AIRBUS PSS TETRA Connectivity Server 7.0 installation due to incorrect default permissions.
- Attacker crafts a malicious executable or script designed to execute arbitrary commands.
- Attacker social engineers or tricks a legitimate user with write access to the vulnerable directory into placing the crafted malicious file into the directory.
- The system or a service running under a higher privilege (e.g., SYSTEM) attempts to execute or process the malicious file placed in the vulnerable directory.
- The malicious code executes with the privileges of the process that initiated it (SYSTEM).
- Attacker leverages SYSTEM privileges to install malware, create new accounts, or modify system configurations.
- Attacker achieves complete control over the compromised Windows Server system.
Impact
Successful exploitation of CVE-2025-7024 allows a low-privileged attacker to gain SYSTEM-level privileges on a Windows Server system running AIRBUS PSS TETRA Connectivity Server 7.0. This could lead to complete system compromise, data breaches, and disruption of services. The impact is critical for organizations relying on this server for their operations, as it can result in significant financial losses, reputational damage, and legal liabilities. Although the number of victims is unknown, the vulnerable software is used in critical infrastructure sectors, amplifying the potential impact.
Recommendation
- Apply the patch provided by AIRBUS to address CVE-2025-7024 on all systems running TETRA Connectivity Server 7.0.
- Implement the Sigma rule “Detect Suspicious File Creation in Vulnerable Directory” to monitor for unauthorized file creation in directories associated with TETRA Connectivity Server.
- Enforce strict file and directory permission policies on Windows Server systems to prevent unauthorized write access to sensitive directories, mitigating the underlying cause of CVE-2025-7024.
- Enable Sysmon file creation event logging (Event ID 11) to improve visibility into file creation activity on the Windows Server system, which is necessary for the Sigma rules.
Detection coverage 2
Detect Suspicious File Creation in Vulnerable Directory
highDetects the creation of new files in directories associated with AIRBUS PSS TETRA Connectivity Server, indicating potential exploitation of CVE-2025-7024.
Detect Executables Started from Unusual Locations
mediumThis rule detects processes being executed from unusual directories which might indicate an exploitation attempt.
Detection queries are kept inside the platform. Get full rules →