CVE-2025-15474: CWE-770 Allocation of Resources Without Limits or Throttling in AuntyFey AuntyFey Smart Combination Lock
AuntyFey Smart Combination Lock firmware versions as of 2025-12-24 contain a vulnerability that allows an unauthenticated attacker within Bluetooth Low Energy (BLE) range to cause a denial of service by repeatedly initiating BLE connections. Sustained connection attempts interrupt keypad authentication input and repeatedly force the device into lockout states, preventing legitimate users from unlocking the device.
AI Analysis
Technical Summary
The vulnerability identified as CVE-2025-15474 affects the AuntyFey Smart Combination Lock firmware versions current as of December 24, 2025. The core issue is an allocation of resources without limits or throttling (CWE-770) in the device's handling of Bluetooth Low Energy (BLE) connections. An unauthenticated attacker within BLE range can repeatedly initiate connection attempts to the lock. These sustained connection attempts interfere with the lock's keypad authentication process by forcing the device into repeated lockout states. This effectively denies legitimate users the ability to unlock the device, resulting in a denial of service (DoS) condition. The attack vector is local (adjacent network), requiring no privileges or user interaction, which lowers the barrier for exploitation. The vulnerability does not impact confidentiality or integrity but severely affects availability. The CVSS 4.0 vector indicates low attack complexity and no required authentication, but the attack scope is limited to the local environment. No patches or exploits are currently known, but the lack of resource throttling in BLE connection handling is a fundamental design flaw. This vulnerability could be exploited in scenarios where physical access control is critical, such as in offices, residential buildings, or secure storage areas using these smart locks. The absence of firmware patches at the time of reporting means that affected devices remain vulnerable until updates are issued by the vendor.
Potential Impact
For European organizations, the primary impact of CVE-2025-15474 is operational disruption due to denial of service on physical access controls. Facilities relying on AuntyFey Smart Combination Locks could experience lockouts, preventing employees or authorized personnel from accessing secured areas. This can lead to productivity losses, emergency response delays, and potential safety hazards if critical areas become inaccessible. In sectors such as healthcare, finance, or government, where physical security is tightly integrated with operational continuity, such disruptions could have cascading effects. Additionally, repeated lockouts may necessitate costly manual overrides or lock replacements. The vulnerability does not expose sensitive data or allow unauthorized access, but the availability impact alone can be significant. European organizations with dense deployments of BLE-enabled smart locks are at higher risk, especially if they lack monitoring or rapid incident response capabilities. The lack of known exploits reduces immediate risk, but the ease of exploitation and local attack vector mean attackers could leverage this vulnerability opportunistically in targeted scenarios.
Mitigation Recommendations
To mitigate CVE-2025-15474, organizations should prioritize obtaining and applying firmware updates from AuntyFey that implement connection throttling and resource allocation limits for BLE connections. Until patches are available, physical security teams should monitor for unusual BLE activity near lock installations using BLE scanning tools to detect repeated connection attempts. Deploying BLE jamming or signal shielding in sensitive areas can reduce attack surface but must comply with local regulations. Implementing multi-factor physical access controls, such as combining smart locks with biometric or RFID authentication, can reduce reliance on vulnerable devices alone. Training staff to recognize and report lockout incidents promptly will aid in rapid response. Incident response plans should include procedures for manual override or emergency access to affected locks. Vendors should be engaged to accelerate patch development and provide guidance on secure configurations. Network segmentation of BLE management infrastructure and logging of lock events can help detect and analyze attack attempts. Finally, organizations should evaluate alternative smart lock solutions with proven resilience against resource exhaustion attacks.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Belgium, Italy
CVE-2025-15474: CWE-770 Allocation of Resources Without Limits or Throttling in AuntyFey AuntyFey Smart Combination Lock
Description
AuntyFey Smart Combination Lock firmware versions as of 2025-12-24 contain a vulnerability that allows an unauthenticated attacker within Bluetooth Low Energy (BLE) range to cause a denial of service by repeatedly initiating BLE connections. Sustained connection attempts interrupt keypad authentication input and repeatedly force the device into lockout states, preventing legitimate users from unlocking the device.
AI-Powered Analysis
Technical Analysis
The vulnerability identified as CVE-2025-15474 affects the AuntyFey Smart Combination Lock firmware versions current as of December 24, 2025. The core issue is an allocation of resources without limits or throttling (CWE-770) in the device's handling of Bluetooth Low Energy (BLE) connections. An unauthenticated attacker within BLE range can repeatedly initiate connection attempts to the lock. These sustained connection attempts interfere with the lock's keypad authentication process by forcing the device into repeated lockout states. This effectively denies legitimate users the ability to unlock the device, resulting in a denial of service (DoS) condition. The attack vector is local (adjacent network), requiring no privileges or user interaction, which lowers the barrier for exploitation. The vulnerability does not impact confidentiality or integrity but severely affects availability. The CVSS 4.0 vector indicates low attack complexity and no required authentication, but the attack scope is limited to the local environment. No patches or exploits are currently known, but the lack of resource throttling in BLE connection handling is a fundamental design flaw. This vulnerability could be exploited in scenarios where physical access control is critical, such as in offices, residential buildings, or secure storage areas using these smart locks. The absence of firmware patches at the time of reporting means that affected devices remain vulnerable until updates are issued by the vendor.
Potential Impact
For European organizations, the primary impact of CVE-2025-15474 is operational disruption due to denial of service on physical access controls. Facilities relying on AuntyFey Smart Combination Locks could experience lockouts, preventing employees or authorized personnel from accessing secured areas. This can lead to productivity losses, emergency response delays, and potential safety hazards if critical areas become inaccessible. In sectors such as healthcare, finance, or government, where physical security is tightly integrated with operational continuity, such disruptions could have cascading effects. Additionally, repeated lockouts may necessitate costly manual overrides or lock replacements. The vulnerability does not expose sensitive data or allow unauthorized access, but the availability impact alone can be significant. European organizations with dense deployments of BLE-enabled smart locks are at higher risk, especially if they lack monitoring or rapid incident response capabilities. The lack of known exploits reduces immediate risk, but the ease of exploitation and local attack vector mean attackers could leverage this vulnerability opportunistically in targeted scenarios.
Mitigation Recommendations
To mitigate CVE-2025-15474, organizations should prioritize obtaining and applying firmware updates from AuntyFey that implement connection throttling and resource allocation limits for BLE connections. Until patches are available, physical security teams should monitor for unusual BLE activity near lock installations using BLE scanning tools to detect repeated connection attempts. Deploying BLE jamming or signal shielding in sensitive areas can reduce attack surface but must comply with local regulations. Implementing multi-factor physical access controls, such as combining smart locks with biometric or RFID authentication, can reduce reliance on vulnerable devices alone. Training staff to recognize and report lockout incidents promptly will aid in rapid response. Incident response plans should include procedures for manual override or emergency access to affected locks. Vendors should be engaged to accelerate patch development and provide guidance on secure configurations. Network segmentation of BLE management infrastructure and logging of lock events can help detect and analyze attack attempts. Finally, organizations should evaluate alternative smart lock solutions with proven resilience against resource exhaustion attacks.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulnCheck
- Date Reserved
- 2026-01-07T04:10:49.571Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 695de67da55ed4ed995516f8
Added to database: 1/7/2026, 4:52:13 AM
Last enriched: 1/7/2026, 4:59:55 AM
Last updated: 1/8/2026, 4:58:24 AM
Views: 13
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.