Skip to main content

CVE-2025-10250: Use of Hard-coded Cryptographic Key in DJI Mavic Spark

Low
VulnerabilityCVE-2025-10250cvecve-2025-10250
Published: Thu Sep 11 2025 (09/11/2025, 11:32:06 UTC)
Source: CVE Database V5
Vendor/Project: DJI
Product: Mavic Spark

Description

A weakness has been identified in DJI Mavic Spark, Mavic Air and Mavic Mini 01.00.0500. Affected is an unknown function of the component Telemetry Channel. Executing manipulation can lead to use of hard-coded cryptographic key . The attacker needs to be present on the local network. A high complexity level is associated with this attack. The exploitability is told to be difficult. The exploit has been made available to the public and could be exploited. This vulnerability only affects products that are no longer supported by the maintainer.

AI-Powered Analysis

AILast updated: 09/11/2025, 11:37:33 UTC

Technical Analysis

CVE-2025-10250 is a vulnerability identified in certain DJI drone models, specifically the Mavic Spark, Mavic Air, and Mavic Mini running firmware version 01.00.0500. The weakness resides in an unspecified function within the Telemetry Channel component, where a hard-coded cryptographic key is used. This cryptographic key is embedded in the firmware and does not change, which can be exploited by an attacker who has access to the local network. The presence of a hard-coded key undermines the confidentiality and integrity of the telemetry data exchanged between the drone and its controller or other components. An attacker on the same local network could potentially intercept, decrypt, or manipulate telemetry data, leading to unauthorized control or data leakage. However, the attack complexity is high, meaning it requires significant skill and effort, and no user interaction or authentication is needed. The exploitability is considered difficult, and although an exploit is publicly available, the affected products are no longer supported by DJI, meaning no official patches or updates are provided. The CVSS 4.0 score is 2.3, reflecting a low severity primarily due to the high attack complexity, limited scope (local network only), and low impact on confidentiality, integrity, and availability. The vulnerability does not affect newer firmware versions or other DJI products.

Potential Impact

For European organizations, the impact of this vulnerability is generally low but not negligible. Organizations using affected DJI drones for commercial, industrial, or recreational purposes could face risks of telemetry data interception or manipulation if an attacker gains access to the same local network. This could lead to privacy breaches, loss of sensitive flight data, or in rare cases, unauthorized drone control, potentially causing physical damage or safety hazards. Since the affected products are no longer supported, organizations relying on these models may be unable to secure their devices through official updates, increasing their exposure. However, the requirement for local network access and high attack complexity limits the likelihood of widespread exploitation. Critical infrastructure or sensitive operations using these drones in Europe should assess the risk carefully, especially in environments where local network security is weak or physical access to the network is possible.

Mitigation Recommendations

Given the lack of official patches, European organizations should adopt specific mitigations: 1) Immediately discontinue use of affected DJI drone models in sensitive or critical operations and replace them with supported models running updated firmware. 2) Isolate drone control networks from general enterprise networks using VLANs or dedicated Wi-Fi segments with strong access controls to prevent unauthorized local network access. 3) Employ strong Wi-Fi security protocols (WPA3 where possible) and monitor for rogue devices or suspicious network activity around drone operation areas. 4) Physically secure drone operation zones to prevent attackers from gaining proximity to the local network. 5) Use network intrusion detection systems (NIDS) to detect anomalous telemetry traffic or attempts to exploit the vulnerability. 6) Educate drone operators about the risks of using outdated firmware and the importance of network security. 7) Consider encrypting telemetry data at higher layers or using VPN tunnels if supported by third-party tools to mitigate risks from the hard-coded key.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-09-11T05:12:36.364Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68c2b46a9f88baefcaada8c9

Added to database: 9/11/2025, 11:37:14 AM

Last enriched: 9/11/2025, 11:37:33 AM

Last updated: 9/11/2025, 11:37:33 AM

Views: 1

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats