Skip to main content

CVE-2025-10252: Deserialization in SEAT Queue Ticket Kiosk

Low
VulnerabilityCVE-2025-10252cvecve-2025-10252
Published: Thu Sep 11 2025 (09/11/2025, 13:32:04 UTC)
Source: CVE Database V5
Vendor/Project: SEAT
Product: Queue Ticket Kiosk

Description

A flaw has been found in SEAT Queue Ticket Kiosk up to 20250827. This affects an unknown part of the component Java RMI Registry Handler. This manipulation causes deserialization. The attack can only be done within the local network. The attack is considered to have high complexity. It is indicated that the exploitability is difficult. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 09/11/2025, 13:39:39 UTC

Technical Analysis

CVE-2025-10252 is a deserialization vulnerability identified in the SEAT Queue Ticket Kiosk product, specifically affecting versions up to 20250827. The flaw resides within the Java RMI (Remote Method Invocation) Registry Handler component, which is responsible for handling remote method calls and object serialization/deserialization. Deserialization vulnerabilities occur when untrusted data is deserialized without proper validation, potentially allowing attackers to execute arbitrary code or manipulate application logic. However, in this case, the attack vector is limited to the local network, meaning an attacker must have network access to the same LAN as the vulnerable kiosk system. The complexity of exploitation is high, indicating that successful exploitation requires advanced skills or specific conditions, and the exploitability is considered difficult. There is no indication that user interaction or authentication is required, but the attack surface is constrained by network access. The vendor has not responded to disclosure attempts, and no patches or mitigations have been published yet. The CVSS 4.0 base score is 2.3, reflecting a low severity primarily due to the limited attack vector (local network), high complexity, and minimal impact on confidentiality, integrity, and availability. No known exploits are currently in the wild. This vulnerability could allow an attacker within the local network to manipulate the kiosk system, potentially causing denial of service or limited unauthorized actions, but widespread or remote exploitation is unlikely given the constraints.

Potential Impact

For European organizations deploying SEAT Queue Ticket Kiosk systems, particularly in environments such as public transport stations, event venues, or customer service centers, this vulnerability poses a localized risk. An attacker with local network access could exploit the deserialization flaw to disrupt kiosk operations, potentially causing service interruptions or unauthorized manipulation of ticketing processes. While the impact on confidentiality and integrity is low, availability could be affected if the kiosk system is destabilized. The limited attack vector reduces the risk of large-scale attacks, but insider threats or attackers gaining local network access (e.g., via compromised devices or Wi-Fi access) could leverage this vulnerability. Organizations in Europe with high-density public venues or critical infrastructure using these kiosks should be aware of the potential for localized disruption. The lack of vendor response and patches increases the risk of prolonged exposure.

Mitigation Recommendations

Given the absence of official patches, European organizations should implement network segmentation to isolate SEAT Queue Ticket Kiosk systems from general user networks, restricting access to trusted devices only. Employ strict access controls and monitoring on local networks to detect unauthorized devices or suspicious activity. Disable or restrict Java RMI services if not essential, or apply runtime protections such as Java security manager policies to limit deserialization operations. Conduct regular network scans and vulnerability assessments to identify exposed kiosk systems. Additionally, consider deploying host-based intrusion detection systems (HIDS) on kiosk devices to monitor for anomalous behavior indicative of exploitation attempts. Organizations should also engage with SEAT for updates and monitor security advisories for patches or mitigations. Finally, implement strong physical security controls to prevent unauthorized local network access.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-09-11T05:25:23.534Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68c2d10a9e4a63635b8cb09d

Added to database: 9/11/2025, 1:39:22 PM

Last enriched: 9/11/2025, 1:39:39 PM

Last updated: 9/11/2025, 2:49:24 PM

Views: 3

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats