Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15474: CWE-770 Allocation of Resources Without Limits or Throttling in AuntyFey AuntyFey Smart Combination Lock

0
Medium
VulnerabilityCVE-2025-15474cvecve-2025-15474cwe-770
Published: Wed Jan 07 2026 (01/07/2026, 04:33:17 UTC)
Source: CVE Database V5
Vendor/Project: AuntyFey
Product: AuntyFey Smart Combination Lock

Description

AuntyFey Smart Combination Lock firmware versions as of 2025-12-24 contain a vulnerability that allows an unauthenticated attacker within Bluetooth Low Energy (BLE) range to cause a denial of service by repeatedly initiating BLE connections. Sustained connection attempts interrupt keypad authentication input and repeatedly force the device into lockout states, preventing legitimate users from unlocking the device.

AI-Powered Analysis

AILast updated: 01/07/2026, 04:59:55 UTC

Technical Analysis

The vulnerability identified as CVE-2025-15474 affects the AuntyFey Smart Combination Lock firmware versions current as of December 24, 2025. The core issue is an allocation of resources without limits or throttling (CWE-770) in the device's handling of Bluetooth Low Energy (BLE) connections. An unauthenticated attacker within BLE range can repeatedly initiate connection attempts to the lock. These sustained connection attempts interfere with the lock's keypad authentication process by forcing the device into repeated lockout states. This effectively denies legitimate users the ability to unlock the device, resulting in a denial of service (DoS) condition. The attack vector is local (adjacent network), requiring no privileges or user interaction, which lowers the barrier for exploitation. The vulnerability does not impact confidentiality or integrity but severely affects availability. The CVSS 4.0 vector indicates low attack complexity and no required authentication, but the attack scope is limited to the local environment. No patches or exploits are currently known, but the lack of resource throttling in BLE connection handling is a fundamental design flaw. This vulnerability could be exploited in scenarios where physical access control is critical, such as in offices, residential buildings, or secure storage areas using these smart locks. The absence of firmware patches at the time of reporting means that affected devices remain vulnerable until updates are issued by the vendor.

Potential Impact

For European organizations, the primary impact of CVE-2025-15474 is operational disruption due to denial of service on physical access controls. Facilities relying on AuntyFey Smart Combination Locks could experience lockouts, preventing employees or authorized personnel from accessing secured areas. This can lead to productivity losses, emergency response delays, and potential safety hazards if critical areas become inaccessible. In sectors such as healthcare, finance, or government, where physical security is tightly integrated with operational continuity, such disruptions could have cascading effects. Additionally, repeated lockouts may necessitate costly manual overrides or lock replacements. The vulnerability does not expose sensitive data or allow unauthorized access, but the availability impact alone can be significant. European organizations with dense deployments of BLE-enabled smart locks are at higher risk, especially if they lack monitoring or rapid incident response capabilities. The lack of known exploits reduces immediate risk, but the ease of exploitation and local attack vector mean attackers could leverage this vulnerability opportunistically in targeted scenarios.

Mitigation Recommendations

To mitigate CVE-2025-15474, organizations should prioritize obtaining and applying firmware updates from AuntyFey that implement connection throttling and resource allocation limits for BLE connections. Until patches are available, physical security teams should monitor for unusual BLE activity near lock installations using BLE scanning tools to detect repeated connection attempts. Deploying BLE jamming or signal shielding in sensitive areas can reduce attack surface but must comply with local regulations. Implementing multi-factor physical access controls, such as combining smart locks with biometric or RFID authentication, can reduce reliance on vulnerable devices alone. Training staff to recognize and report lockout incidents promptly will aid in rapid response. Incident response plans should include procedures for manual override or emergency access to affected locks. Vendors should be engaged to accelerate patch development and provide guidance on secure configurations. Network segmentation of BLE management infrastructure and logging of lock events can help detect and analyze attack attempts. Finally, organizations should evaluate alternative smart lock solutions with proven resilience against resource exhaustion attacks.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2026-01-07T04:10:49.571Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 695de67da55ed4ed995516f8

Added to database: 1/7/2026, 4:52:13 AM

Last enriched: 1/7/2026, 4:59:55 AM

Last updated: 1/8/2026, 4:58:24 AM

Views: 13

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats