CVE-2025-14858: CWE-226 Sensitive Information in Resource Not Removed Before Reuse in Semtech LR1110
The Semtech LR11xx LoRa transceivers running early versions of firmware contains an information disclosure vulnerability in its firmware validation functionality. When a host issues a firmware validity check command via the SPI interface, the device decrypts the provided encrypted firmware package block-by-block to validate its integrity. However, the last decrypted firmware block remains uncleared in memory after the validation process completes. An attacker with access to the SPI interface can subsequently issue memory read commands to retrieve the decrypted firmware contents from this residual memory, effectively bypassing the firmware encryption protection mechanism. The attack requires physical access to the device's SPI interface.
AI Analysis
Technical Summary
Semtech LR1110 LoRa transceivers running early firmware versions have a vulnerability (CWE-226) where sensitive decrypted firmware data is not cleared from memory after a firmware validation process. Specifically, when a host issues a firmware validity check command via SPI, the device decrypts the firmware package block-by-block but leaves the last decrypted block uncleared in memory. An attacker with physical SPI interface access can issue memory read commands to retrieve this decrypted firmware block, effectively bypassing the firmware encryption mechanism. This vulnerability impacts firmware confidentiality but requires physical device access and no privileges or user interaction.
Potential Impact
The vulnerability allows an attacker with physical access to the SPI interface to read decrypted firmware contents from residual memory after a firmware validation operation. This leads to disclosure of sensitive firmware data that should be protected by encryption. The impact is limited to confidentiality loss of firmware code. There is no indication of privilege escalation, denial of service, or integrity compromise. No known exploits are reported in the wild. The attack complexity is low given physical access, but the requirement for physical SPI interface access limits remote exploitation.
Mitigation Recommendations
Patch status is not yet confirmed — check the vendor advisory for current remediation guidance. Until an official fix is released, restrict physical access to devices and their SPI interfaces to trusted personnel only. Monitor Semtech communications for firmware updates addressing this issue. No other specific mitigations are documented at this time.
CVE-2025-14858: CWE-226 Sensitive Information in Resource Not Removed Before Reuse in Semtech LR1110
Description
The Semtech LR11xx LoRa transceivers running early versions of firmware contains an information disclosure vulnerability in its firmware validation functionality. When a host issues a firmware validity check command via the SPI interface, the device decrypts the provided encrypted firmware package block-by-block to validate its integrity. However, the last decrypted firmware block remains uncleared in memory after the validation process completes. An attacker with access to the SPI interface can subsequently issue memory read commands to retrieve the decrypted firmware contents from this residual memory, effectively bypassing the firmware encryption protection mechanism. The attack requires physical access to the device's SPI interface.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
Semtech LR1110 LoRa transceivers running early firmware versions have a vulnerability (CWE-226) where sensitive decrypted firmware data is not cleared from memory after a firmware validation process. Specifically, when a host issues a firmware validity check command via SPI, the device decrypts the firmware package block-by-block but leaves the last decrypted block uncleared in memory. An attacker with physical SPI interface access can issue memory read commands to retrieve this decrypted firmware block, effectively bypassing the firmware encryption mechanism. This vulnerability impacts firmware confidentiality but requires physical device access and no privileges or user interaction.
Potential Impact
The vulnerability allows an attacker with physical access to the SPI interface to read decrypted firmware contents from residual memory after a firmware validation operation. This leads to disclosure of sensitive firmware data that should be protected by encryption. The impact is limited to confidentiality loss of firmware code. There is no indication of privilege escalation, denial of service, or integrity compromise. No known exploits are reported in the wild. The attack complexity is low given physical access, but the requirement for physical SPI interface access limits remote exploitation.
Mitigation Recommendations
Patch status is not yet confirmed — check the vendor advisory for current remediation guidance. Until an official fix is released, restrict physical access to devices and their SPI interfaces to trusted personnel only. Monitor Semtech communications for firmware updates addressing this issue. No other specific mitigations are documented at this time.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- SWI
- Date Reserved
- 2025-12-18T00:09:38.279Z
- Cvss Version
- 4.0
- State
- PUBLISHED
- Remediation Level
- null
Threat ID: 69d5660baaed68159a5b4069
Added to database: 4/7/2026, 8:16:11 PM
Last enriched: 4/7/2026, 8:32:04 PM
Last updated: 4/8/2026, 12:42:25 AM
Views: 3
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.