CVE-2025-12902: CWE-665 Improper Initialization in Solidigm™ D5-P5316, D5-P5430, D7-P5520/D7-P5620, D5-P5336
Improper resource management in firmware of some Solidigm DC Products may allow an attacker with local or physical access to gain un-authorized access to a locked Storage Device or create a Denial of Service.
AI Analysis
Technical Summary
CVE-2025-12902 is a firmware vulnerability classified under CWE-665 (Improper Initialization) affecting several Solidigm DC storage products: D5-P5316, D5-P5430, D7-P5520/D7-P5620, and D5-P5336. The issue arises from improper resource management within the device firmware that can be exploited by an attacker who has local or physical access and possesses high-level privileges on the system. This flaw allows unauthorized access to a locked storage device, effectively bypassing security controls designed to protect data confidentiality. Additionally, the vulnerability can be leveraged to cause a denial of service, potentially disrupting availability. The CVSS v3.1 score is 4.4 (medium), reflecting the requirement for local access (AV:L), low attack complexity (AC:L), high privileges (PR:H), no user interaction (UI:N), unchanged scope (S:U), high confidentiality impact (C:H), and no impact on integrity or availability (I:N/A:N). The vulnerability affects all firmware versions prior to specific releases (ACV10360, 6DV10341, 6CV10241, 9CV10490, 5CV10326), indicating that firmware updates are critical to remediation. No known exploits have been reported in the wild, suggesting that exploitation may be non-trivial or not yet observed. The vulnerability primarily threatens data confidentiality by potentially exposing locked storage contents to unauthorized users with physical or local access, which is a significant concern for enterprise environments relying on these drives for sensitive data storage.
Potential Impact
For European organizations, the primary impact of CVE-2025-12902 is the potential unauthorized disclosure of sensitive data stored on affected Solidigm DC drives, especially in environments where physical or local access controls are insufficient. This could undermine data protection obligations under GDPR and other regulations. The denial of service aspect could disrupt critical storage availability, impacting business continuity. Organizations with data centers or critical infrastructure using these drives may face increased risk of insider threats or physical attacks leading to data breaches. The requirement for high privileges and local access somewhat limits remote exploitation but does not eliminate risk from malicious insiders or attackers with physical access. The confidentiality impact is high, while integrity and availability impacts are limited. Given the medium CVSS score, the threat is moderate but significant in environments with sensitive data and less stringent physical security.
Mitigation Recommendations
1. Immediately identify and inventory all affected Solidigm DC drives within the organization to assess exposure. 2. Apply the latest firmware updates from Solidigm that address CVE-2025-12902 as soon as they become available, ensuring all drives run versions equal to or later than ACV10360, 6DV10341, 6CV10241, 9CV10490, or 5CV10326 as applicable. 3. Strengthen physical security controls to prevent unauthorized local or physical access to storage devices, including secure data center access policies, surveillance, and tamper-evident measures. 4. Limit administrative privileges on systems interfacing with these drives to reduce the risk of privilege escalation and misuse. 5. Implement monitoring and logging for unusual access patterns or attempts to access locked storage devices. 6. Consider encryption at the file system or application level as an additional layer of data protection to mitigate risks from firmware-level vulnerabilities. 7. Conduct regular security audits and penetration tests focusing on physical and local access controls to identify potential weaknesses. 8. Educate staff about the risks of physical access attacks and enforce strict access policies.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy
CVE-2025-12902: CWE-665 Improper Initialization in Solidigm™ D5-P5316, D5-P5430, D7-P5520/D7-P5620, D5-P5336
Description
Improper resource management in firmware of some Solidigm DC Products may allow an attacker with local or physical access to gain un-authorized access to a locked Storage Device or create a Denial of Service.
AI-Powered Analysis
Technical Analysis
CVE-2025-12902 is a firmware vulnerability classified under CWE-665 (Improper Initialization) affecting several Solidigm DC storage products: D5-P5316, D5-P5430, D7-P5520/D7-P5620, and D5-P5336. The issue arises from improper resource management within the device firmware that can be exploited by an attacker who has local or physical access and possesses high-level privileges on the system. This flaw allows unauthorized access to a locked storage device, effectively bypassing security controls designed to protect data confidentiality. Additionally, the vulnerability can be leveraged to cause a denial of service, potentially disrupting availability. The CVSS v3.1 score is 4.4 (medium), reflecting the requirement for local access (AV:L), low attack complexity (AC:L), high privileges (PR:H), no user interaction (UI:N), unchanged scope (S:U), high confidentiality impact (C:H), and no impact on integrity or availability (I:N/A:N). The vulnerability affects all firmware versions prior to specific releases (ACV10360, 6DV10341, 6CV10241, 9CV10490, 5CV10326), indicating that firmware updates are critical to remediation. No known exploits have been reported in the wild, suggesting that exploitation may be non-trivial or not yet observed. The vulnerability primarily threatens data confidentiality by potentially exposing locked storage contents to unauthorized users with physical or local access, which is a significant concern for enterprise environments relying on these drives for sensitive data storage.
Potential Impact
For European organizations, the primary impact of CVE-2025-12902 is the potential unauthorized disclosure of sensitive data stored on affected Solidigm DC drives, especially in environments where physical or local access controls are insufficient. This could undermine data protection obligations under GDPR and other regulations. The denial of service aspect could disrupt critical storage availability, impacting business continuity. Organizations with data centers or critical infrastructure using these drives may face increased risk of insider threats or physical attacks leading to data breaches. The requirement for high privileges and local access somewhat limits remote exploitation but does not eliminate risk from malicious insiders or attackers with physical access. The confidentiality impact is high, while integrity and availability impacts are limited. Given the medium CVSS score, the threat is moderate but significant in environments with sensitive data and less stringent physical security.
Mitigation Recommendations
1. Immediately identify and inventory all affected Solidigm DC drives within the organization to assess exposure. 2. Apply the latest firmware updates from Solidigm that address CVE-2025-12902 as soon as they become available, ensuring all drives run versions equal to or later than ACV10360, 6DV10341, 6CV10241, 9CV10490, or 5CV10326 as applicable. 3. Strengthen physical security controls to prevent unauthorized local or physical access to storage devices, including secure data center access policies, surveillance, and tamper-evident measures. 4. Limit administrative privileges on systems interfacing with these drives to reduce the risk of privilege escalation and misuse. 5. Implement monitoring and logging for unusual access patterns or attempts to access locked storage devices. 6. Consider encryption at the file system or application level as an additional layer of data protection to mitigate risks from firmware-level vulnerabilities. 7. Conduct regular security audits and penetration tests focusing on physical and local access controls to identify potential weaknesses. 8. Educate staff about the risks of physical access attacks and enforce strict access policies.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Solidigm
- Date Reserved
- 2025-11-07T20:08:57.840Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 690e5d6d1aa5a3f4ee24f35a
Added to database: 11/7/2025, 8:58:21 PM
Last enriched: 11/7/2025, 9:06:48 PM
Last updated: 11/8/2025, 2:16:22 AM
Views: 7
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-64494: CWE-150: Improper Neutralization of Escape, Meta, or Control Sequences in charmbracelet soft-serve
MediumCVE-2025-64493: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in SuiteCRM SuiteCRM-Core
MediumCVE-2025-64492: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in SuiteCRM SuiteCRM-Core
HighCVE-2025-64486: CWE-73: External Control of File Name or Path in kovidgoyal calibre
CriticalCVE-2025-64485: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in cvat-ai cvat
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.