CVE-2025-59109

N/A Unknown

📋 TL;DR

The dormakaba PIN Pad Units 9002 have an exposed UART hardware interface that transmits every button press, including PIN codes, in plaintext. An attacker with physical access can install a hardware implant to intercept PINs. This affects organizations using these specific PIN pad devices for access control.

💻 Affected Systems

Products:
  • dormakaba registration units 9002 (PIN Pad Units)
Versions: All versions with exposed UART header
Operating Systems: Embedded system firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in the hardware design and firmware behavior. All units with the exposed UART header are affected.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of physical security systems, unauthorized access to secured areas, theft of sensitive assets, and potential safety risks.

🟠

Likely Case

PIN code theft leading to unauthorized physical access to controlled areas, potentially enabling theft or surveillance.

🟢

If Mitigated

Limited impact if devices are physically secured and monitored, though the fundamental vulnerability remains.

🌐 Internet-Facing: LOW - This is a physical hardware vulnerability requiring physical access to devices.
🏢 Internal Only: HIGH - Devices are typically installed in accessible locations, making physical tampering feasible for insiders or visitors.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires physical access and hardware skills to install an implant, but detailed technical information is publicly available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: N/A

Vendor Advisory: https://www.dormakabagroup.com/en/security-advisories

Restart Required: No

Instructions:

No software patch available. Contact dormakaba for hardware replacement options or mitigation guidance.

🔧 Temporary Workarounds

Physical Security Enhancement

all

Secure devices in tamper-evident enclosures and monitor for physical tampering.

UART Port Disable/Protection

all

If technically feasible, disable UART output or physically cover/protect the UART header.

🧯 If You Can't Patch

  • Implement strict physical access controls and surveillance around PIN pad installations
  • Consider replacing vulnerable units with updated hardware models if available from vendor

🔍 How to Verify

Check if Vulnerable:

Physically inspect device backside for exposed UART header (typically 4 pins). Check if button presses are transmitted via UART using a serial monitor.

Check Version:

N/A - Hardware vulnerability not version-dependent

Verify Fix Applied:

Verify UART header is physically covered/disabled or device has been replaced with secure model.

📡 Detection & Monitoring

Log Indicators:

  • Physical tampering alerts
  • Access control system anomalies
  • Unexpected access patterns

Network Indicators:

  • Wireless signals from unauthorized devices near PIN pads (if implant uses WiFi)

SIEM Query:

Search for physical security system alerts, access control anomalies, or wireless device detection near secure areas

🔗 References

📤 Share & Export