CVE-2025-25650

9.1 CRITICAL

📋 TL;DR

This vulnerability in Dorset DG 201 Digital Lock allows attackers to clone NFC cards by exploiting insecure storage of NFC data, enabling unauthorized physical access. It affects users of the specific lock model with vulnerable firmware. The high CVSS score reflects the authentication bypass risk.

💻 Affected Systems

Products:
  • Dorset DG 201 Digital Lock
Versions: H5_433WBSK_v2.2_220605
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects the specific firmware version mentioned; other versions may have different security implementations.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete physical security compromise where attackers gain unrestricted access to secured premises by cloning legitimate NFC cards.

🟠

Likely Case

Unauthorized individuals clone existing NFC cards to gain physical access to buildings or rooms protected by these locks.

🟢

If Mitigated

With proper physical security controls and monitoring, impact is limited to specific compromised cards rather than entire access systems.

🌐 Internet-Facing: LOW - This is a physical access vulnerability requiring proximity to NFC cards, not internet exposure.
🏢 Internal Only: HIGH - The vulnerability allows physical access bypass within secured facilities using these locks.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Attack requires physical proximity to NFC cards and basic RFID cloning equipment. The GitHub reference includes detailed exploitation methodology.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Unknown

Restart Required: No

Instructions:

No official patch available. Contact Dorset vendor for firmware updates or replacement recommendations.

🔧 Temporary Workarounds

Physical Access Control Enhancement

all

Implement additional physical security layers beyond NFC authentication

NFC Card Management

all

Implement strict NFC card issuance, tracking, and revocation procedures

🧯 If You Can't Patch

  • Replace vulnerable locks with models using secure NFC implementations
  • Implement multi-factor physical access (NFC + PIN, biometric, or physical key backup)

🔍 How to Verify

Check if Vulnerable:

Check lock firmware version via manufacturer's app or physical inspection. Version H5_433WBSK_v2.2_220605 is vulnerable.

Check Version:

No standard command - check via manufacturer's mobile app or physical device interface.

Verify Fix Applied:

Verify firmware has been updated to a version not listed as vulnerable. Test with NFC cloning equipment if possible.

📡 Detection & Monitoring

Log Indicators:

  • Unusual access patterns, multiple access attempts with same card ID in short time

Network Indicators:

  • Not applicable - physical access system

SIEM Query:

Not applicable for physical access systems without digital logging integration

🔗 References

📤 Share & Export