CVE-2025-15474

N/A Unknown

📋 TL;DR

This vulnerability allows an unauthenticated attacker within Bluetooth Low Energy (BLE) range to cause a denial of service on AuntyFey Smart Combination Locks by flooding connection requests. The attack interrupts legitimate keypad authentication and forces repeated lockouts, preventing authorized users from unlocking the device. Only users of affected AuntyFey smart locks are impacted.

💻 Affected Systems

Products:
  • AuntyFey Smart Combination Lock
Versions: Firmware versions as of 2025-12-24
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: All devices with default BLE configuration are vulnerable. The attack requires physical proximity within BLE range (typically up to 100 meters).

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Physical security compromise where legitimate users cannot access secured areas due to sustained lockout, potentially requiring physical destruction of the lock or alternative entry methods.

🟠

Likely Case

Temporary denial of service preventing legitimate users from unlocking the device until the BLE connection flood stops, causing inconvenience and potential minor security delays.

🟢

If Mitigated

Minimal impact if device is physically secured from nearby attackers or if firmware is patched to implement connection rate limiting.

🌐 Internet-Facing: LOW - The vulnerability requires physical proximity via BLE and does not involve internet connectivity.
🏢 Internal Only: MEDIUM - The attack requires physical proximity but could be executed by anyone with BLE capability within range of the lock.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public proof-of-concept code exists on GitHub. Attack requires only BLE-capable device and knowledge of the lock's BLE address. No authentication or special tools needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not available

Restart Required: No

Instructions:

No official patch available. Check manufacturer website for firmware updates. If update becomes available, follow manufacturer's instructions to update lock firmware via their mobile app.

🔧 Temporary Workarounds

Physical isolation

all

Place lock in location with limited physical access to reduce attacker proximity

Temporary BLE disable

all

If supported, temporarily disable BLE functionality via manufacturer app

🧯 If You Can't Patch

  • Monitor for unusual BLE activity patterns using BLE scanning tools
  • Implement physical security measures to limit proximity access to the lock

🔍 How to Verify

Check if Vulnerable:

Check firmware version in manufacturer's mobile app. If version date is 2025-12-24 or earlier, device is vulnerable.

Check Version:

Use manufacturer's mobile app to check firmware version under device settings.

Verify Fix Applied:

After any firmware update, verify version in manufacturer app shows date later than 2025-12-24.

📡 Detection & Monitoring

Log Indicators:

  • Repeated BLE connection attempts in device logs
  • Multiple failed authentication attempts
  • Frequent lockout state entries

Network Indicators:

  • Unusual BLE connection patterns from unknown MAC addresses
  • High frequency of BLE connection requests

SIEM Query:

Not applicable - this is a physical device vulnerability not typically monitored by enterprise SIEM systems.

🔗 References

📤 Share & Export