Skip to main content

CVE-2025-30072: n/a

High
VulnerabilityCVE-2025-30072cvecve-2025-30072
Published: Mon May 19 2025 (05/19/2025, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: n/a

Description

Tiiwee X1 Alarm System TWX1HAKV2 allows Authentication Bypass by Capture-replay, leading to physical Access to the protected facilities without triggering an alarm.

AI-Powered Analysis

AILast updated: 07/06/2025, 07:24:33 UTC

Technical Analysis

CVE-2025-30072 is a high-severity vulnerability affecting the Tiiwee X1 Alarm System model TWX1HAKV2. The vulnerability allows an attacker to bypass authentication mechanisms through a capture-replay attack. Specifically, an attacker can capture legitimate authentication signals or tokens transmitted by authorized users and replay them to the alarm system to gain unauthorized physical access to protected facilities. This bypass occurs without triggering the alarm, effectively rendering the security system ineffective. The vulnerability is classified under CWE-294, which relates to improper authentication. The CVSS 3.1 base score of 7.6 reflects a high severity, with the vector indicating that the attack can be performed remotely (AV:N), requires low attack complexity (AC:L), no privileges (PR:N), but does require user interaction (UI:R). The impact affects confidentiality and integrity to a low degree but has a high impact on availability, as the alarm system’s ability to detect unauthorized access is compromised. No patches or vendor advisories are currently available, and no known exploits are reported in the wild as of the publication date (May 19, 2025).

Potential Impact

For European organizations, this vulnerability poses a significant risk to physical security, especially for facilities relying on the Tiiwee X1 Alarm System TWX1HAKV2 to protect sensitive or critical infrastructure. Successful exploitation could allow unauthorized individuals to enter premises undetected, potentially leading to theft, espionage, sabotage, or harm to personnel. The inability of the alarm system to trigger alerts undermines trust in physical security controls and may lead to increased operational risks and financial losses. Organizations in sectors such as government, finance, healthcare, manufacturing, and critical infrastructure are particularly vulnerable. The capture-replay nature of the attack means that attackers need to be in proximity to capture authentication signals, but once obtained, they can bypass alarms without raising suspicion. This could also facilitate insider threats or targeted attacks by adversaries with physical access to the vicinity of the alarm system.

Mitigation Recommendations

Given the absence of official patches, European organizations should implement compensating controls immediately. These include: 1) Deploying additional layers of physical security such as CCTV with motion detection and video analytics to detect unauthorized presence independently of the alarm system. 2) Using multi-factor authentication methods for physical access that do not rely solely on replayable signals, such as biometric verification or challenge-response tokens resistant to replay attacks. 3) Monitoring and logging all access attempts and correlating with other security systems to detect anomalies. 4) Restricting physical proximity to the alarm system’s communication channels to prevent attackers from capturing authentication data, for example by shielding wireless signals or relocating receivers. 5) Conducting regular security audits and penetration testing focused on physical security controls. 6) Engaging with the vendor or suppliers to obtain updates or firmware patches as soon as they become available. 7) Training security personnel to recognize signs of tampering or replay attacks and to respond promptly.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-03-16T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f81484d88663aeb5a2

Added to database: 5/20/2025, 6:59:04 PM

Last enriched: 7/6/2025, 7:24:33 AM

Last updated: 8/16/2025, 2:02:14 PM

Views: 15

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats