Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12896: CWE-307 Improper Restriction of Excessive Authentication Attempts in Solidigm™ D5-P5316, D7-P5510, D7-P5520/D7-P5620, D5-P5430, D5-P5336

0
Medium
VulnerabilityCVE-2025-12896cvecve-2025-12896cwe-307
Published: Fri Nov 07 2025 (11/07/2025, 20:24:11 UTC)
Source: CVE Database V5
Vendor/Project: Solidigm™
Product: D5-P5316, D7-P5510, D7-P5520/D7-P5620, D5-P5430, D5-P5336

Description

Improper resource management in firmware of some Solidigm DC Products may allow an attacker with local or physical access to gain un-authorized access to a locked storage device.

AI-Powered Analysis

AILast updated: 11/07/2025, 21:07:03 UTC

Technical Analysis

CVE-2025-12896 is a firmware vulnerability classified under CWE-307 (Improper Restriction of Excessive Authentication Attempts) affecting multiple Solidigm DC SSD models including D5-P5316, D7-P5510, D7-P5520/D7-P5620, D5-P5430, and D5-P5336. The flaw arises from improper resource management in the device firmware that fails to adequately restrict repeated authentication attempts, allowing an attacker with local or physical access to bypass the lock mechanism on the storage device. This bypass can lead to unauthorized access to the data stored on the SSD, compromising confidentiality. The vulnerability affects all firmware versions prior to specific patches (ACV10360, JCV10501, 9CV10490, 6DV10341/6CV10241, 5CV10326). Exploitation requires the attacker to have high privileges locally, such as administrative or physical access to the device, but does not require user interaction. The CVSS v3.1 base score is 4.4, reflecting a medium severity due to the attack vector being local and the requirement for high privileges, but with a high impact on confidentiality if exploited. No public exploits have been reported yet. The vulnerability is particularly relevant for environments where these SSDs are deployed in data centers or enterprise storage systems, as unauthorized access could lead to data leakage or compromise of sensitive information. The firmware patches address the improper authentication attempt restrictions by enforcing stricter controls and resource management to prevent bypass attempts.

Potential Impact

For European organizations, the primary impact of this vulnerability is the potential unauthorized disclosure of sensitive data stored on affected Solidigm SSDs. Organizations in sectors such as finance, healthcare, government, and critical infrastructure that rely on these SSDs for secure data storage could face significant confidentiality breaches if attackers gain physical or local access to the devices. The vulnerability does not affect data integrity or availability directly but compromises the trustworthiness of data confidentiality. Given the requirement for local high-privilege access, the threat is more pronounced in environments with less stringent physical security or where insider threats are a concern. The impact is heightened in data centers or enterprise environments where these SSDs are deployed at scale, as a single compromised device could expose large volumes of sensitive information. Additionally, the lack of known exploits in the wild suggests that proactive patching can effectively mitigate risk before widespread exploitation occurs.

Mitigation Recommendations

1. Immediately update the firmware on all affected Solidigm SSD models to the patched versions ACV10360, JCV10501, 9CV10490, 6DV10341/6CV10241, or 5CV10326 or later. 2. Implement strict physical security controls to prevent unauthorized local or physical access to storage devices, including locked server rooms, surveillance, and access logging. 3. Enforce role-based access controls and limit administrative privileges to trusted personnel only. 4. Regularly audit and monitor access to storage devices to detect any anomalous or unauthorized attempts. 5. Consider deploying full disk encryption solutions that provide an additional layer of protection beyond device-level authentication. 6. Educate staff on the risks of insider threats and the importance of securing physical access to critical hardware. 7. Maintain an inventory of affected devices and track firmware versions to ensure compliance with patching policies. 8. Coordinate with Solidigm support for any additional security advisories or updates related to this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Solidigm
Date Reserved
2025-11-07T18:56:03.627Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690e5d6d1aa5a3f4ee24f357

Added to database: 11/7/2025, 8:58:21 PM

Last enriched: 11/7/2025, 9:07:03 PM

Last updated: 11/8/2025, 3:22:14 AM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats