CVE-2025-12896: CWE-307 Improper Restriction of Excessive Authentication Attempts in Solidigm™ D5-P5316, D7-P5510, D7-P5520/D7-P5620, D5-P5430, D5-P5336
Improper resource management in firmware of some Solidigm DC Products may allow an attacker with local or physical access to gain un-authorized access to a locked storage device.
AI Analysis
Technical Summary
CVE-2025-12896 is a firmware vulnerability classified under CWE-307 (Improper Restriction of Excessive Authentication Attempts) affecting multiple Solidigm DC SSD models including D5-P5316, D7-P5510, D7-P5520/D7-P5620, D5-P5430, and D5-P5336. The flaw arises from improper resource management in the device firmware that fails to adequately restrict repeated authentication attempts, allowing an attacker with local or physical access to bypass the lock mechanism on the storage device. This bypass can lead to unauthorized access to the data stored on the SSD, compromising confidentiality. The vulnerability affects all firmware versions prior to specific patches (ACV10360, JCV10501, 9CV10490, 6DV10341/6CV10241, 5CV10326). Exploitation requires the attacker to have high privileges locally, such as administrative or physical access to the device, but does not require user interaction. The CVSS v3.1 base score is 4.4, reflecting a medium severity due to the attack vector being local and the requirement for high privileges, but with a high impact on confidentiality if exploited. No public exploits have been reported yet. The vulnerability is particularly relevant for environments where these SSDs are deployed in data centers or enterprise storage systems, as unauthorized access could lead to data leakage or compromise of sensitive information. The firmware patches address the improper authentication attempt restrictions by enforcing stricter controls and resource management to prevent bypass attempts.
Potential Impact
For European organizations, the primary impact of this vulnerability is the potential unauthorized disclosure of sensitive data stored on affected Solidigm SSDs. Organizations in sectors such as finance, healthcare, government, and critical infrastructure that rely on these SSDs for secure data storage could face significant confidentiality breaches if attackers gain physical or local access to the devices. The vulnerability does not affect data integrity or availability directly but compromises the trustworthiness of data confidentiality. Given the requirement for local high-privilege access, the threat is more pronounced in environments with less stringent physical security or where insider threats are a concern. The impact is heightened in data centers or enterprise environments where these SSDs are deployed at scale, as a single compromised device could expose large volumes of sensitive information. Additionally, the lack of known exploits in the wild suggests that proactive patching can effectively mitigate risk before widespread exploitation occurs.
Mitigation Recommendations
1. Immediately update the firmware on all affected Solidigm SSD models to the patched versions ACV10360, JCV10501, 9CV10490, 6DV10341/6CV10241, or 5CV10326 or later. 2. Implement strict physical security controls to prevent unauthorized local or physical access to storage devices, including locked server rooms, surveillance, and access logging. 3. Enforce role-based access controls and limit administrative privileges to trusted personnel only. 4. Regularly audit and monitor access to storage devices to detect any anomalous or unauthorized attempts. 5. Consider deploying full disk encryption solutions that provide an additional layer of protection beyond device-level authentication. 6. Educate staff on the risks of insider threats and the importance of securing physical access to critical hardware. 7. Maintain an inventory of affected devices and track firmware versions to ensure compliance with patching policies. 8. Coordinate with Solidigm support for any additional security advisories or updates related to this vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy
CVE-2025-12896: CWE-307 Improper Restriction of Excessive Authentication Attempts in Solidigm™ D5-P5316, D7-P5510, D7-P5520/D7-P5620, D5-P5430, D5-P5336
Description
Improper resource management in firmware of some Solidigm DC Products may allow an attacker with local or physical access to gain un-authorized access to a locked storage device.
AI-Powered Analysis
Technical Analysis
CVE-2025-12896 is a firmware vulnerability classified under CWE-307 (Improper Restriction of Excessive Authentication Attempts) affecting multiple Solidigm DC SSD models including D5-P5316, D7-P5510, D7-P5520/D7-P5620, D5-P5430, and D5-P5336. The flaw arises from improper resource management in the device firmware that fails to adequately restrict repeated authentication attempts, allowing an attacker with local or physical access to bypass the lock mechanism on the storage device. This bypass can lead to unauthorized access to the data stored on the SSD, compromising confidentiality. The vulnerability affects all firmware versions prior to specific patches (ACV10360, JCV10501, 9CV10490, 6DV10341/6CV10241, 5CV10326). Exploitation requires the attacker to have high privileges locally, such as administrative or physical access to the device, but does not require user interaction. The CVSS v3.1 base score is 4.4, reflecting a medium severity due to the attack vector being local and the requirement for high privileges, but with a high impact on confidentiality if exploited. No public exploits have been reported yet. The vulnerability is particularly relevant for environments where these SSDs are deployed in data centers or enterprise storage systems, as unauthorized access could lead to data leakage or compromise of sensitive information. The firmware patches address the improper authentication attempt restrictions by enforcing stricter controls and resource management to prevent bypass attempts.
Potential Impact
For European organizations, the primary impact of this vulnerability is the potential unauthorized disclosure of sensitive data stored on affected Solidigm SSDs. Organizations in sectors such as finance, healthcare, government, and critical infrastructure that rely on these SSDs for secure data storage could face significant confidentiality breaches if attackers gain physical or local access to the devices. The vulnerability does not affect data integrity or availability directly but compromises the trustworthiness of data confidentiality. Given the requirement for local high-privilege access, the threat is more pronounced in environments with less stringent physical security or where insider threats are a concern. The impact is heightened in data centers or enterprise environments where these SSDs are deployed at scale, as a single compromised device could expose large volumes of sensitive information. Additionally, the lack of known exploits in the wild suggests that proactive patching can effectively mitigate risk before widespread exploitation occurs.
Mitigation Recommendations
1. Immediately update the firmware on all affected Solidigm SSD models to the patched versions ACV10360, JCV10501, 9CV10490, 6DV10341/6CV10241, or 5CV10326 or later. 2. Implement strict physical security controls to prevent unauthorized local or physical access to storage devices, including locked server rooms, surveillance, and access logging. 3. Enforce role-based access controls and limit administrative privileges to trusted personnel only. 4. Regularly audit and monitor access to storage devices to detect any anomalous or unauthorized attempts. 5. Consider deploying full disk encryption solutions that provide an additional layer of protection beyond device-level authentication. 6. Educate staff on the risks of insider threats and the importance of securing physical access to critical hardware. 7. Maintain an inventory of affected devices and track firmware versions to ensure compliance with patching policies. 8. Coordinate with Solidigm support for any additional security advisories or updates related to this vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Solidigm
- Date Reserved
- 2025-11-07T18:56:03.627Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 690e5d6d1aa5a3f4ee24f357
Added to database: 11/7/2025, 8:58:21 PM
Last enriched: 11/7/2025, 9:07:03 PM
Last updated: 11/8/2025, 3:22:14 AM
Views: 6
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
SonicWall Firewall Backups Stolen by Nation-State Actor
MediumSora 2 Makes Videos So Believable, Reality Checks Are Required
MediumMicrosoft Backs Massive AI Push in UAE, Raising Security Concerns
Medium'Ransomvibing' Infests Visual Studio Extension Market
MediumCVE-2025-12583: CWE-862 Missing Authorization in neofix Simple Downloads List
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.