Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-56562: n/a

0
High
VulnerabilityCVE-2025-56562cvecve-2025-56562
Published: Tue Sep 16 2025 (09/16/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

An incorrect API discovered in Signify Wiz Connected 1.9.1 allows attackers to remotely launch a DoS on Wiz devices only requiring the MAC address.

AI-Powered Analysis

AILast updated: 09/24/2025, 01:09:43 UTC

Technical Analysis

CVE-2025-56562 is a high-severity vulnerability affecting Signify Wiz Connected devices, specifically version 1.9.1. The root cause is an incorrect API implementation that allows an unauthenticated remote attacker to launch a Denial of Service (DoS) attack against Wiz devices by simply knowing their MAC address. The vulnerability does not require any user interaction or privileges, making it remotely exploitable over the network. The CVSS 3.1 base score of 7.5 reflects the ease of exploitation (network attack vector, low attack complexity, no privileges or user interaction required) and the impact limited to availability (no confidentiality or integrity impact). The CWE-306 classification indicates missing or insufficient authentication, which aligns with the vulnerability allowing unauthenticated access to a critical API endpoint. Although no known exploits are currently observed in the wild and no patches have been released yet, the vulnerability poses a significant risk to the availability of Wiz Connected devices, potentially disrupting smart home or building automation systems relying on these devices. The lack of authentication means attackers can target devices en masse if MAC addresses are known or can be discovered, causing widespread service disruption.

Potential Impact

For European organizations, especially those utilizing Signify Wiz Connected devices in smart building management, lighting control, or IoT deployments, this vulnerability could lead to significant operational disruptions. A successful DoS attack could render lighting or connected devices inoperable, impacting business continuity, safety, and user comfort. Critical infrastructure facilities, office buildings, and public spaces relying on these devices may experience outages or degraded service. Although the vulnerability does not compromise data confidentiality or integrity, the availability impact can affect productivity and safety systems. Additionally, the ease of exploitation without authentication increases the risk of automated or large-scale attacks. Organizations may also face reputational damage and potential regulatory scrutiny under European cybersecurity and data protection regulations if service disruptions affect users or customers.

Mitigation Recommendations

Given the absence of an official patch at this time, European organizations should implement network-level mitigations to reduce exposure. These include segmenting IoT devices on isolated VLANs or separate subnets with strict firewall rules to restrict inbound traffic to trusted sources only. Network monitoring should be enhanced to detect unusual traffic patterns targeting MAC addresses of Wiz devices. Employing intrusion detection/prevention systems (IDS/IPS) with custom signatures for suspicious API calls can help identify exploitation attempts. Organizations should also inventory all Wiz Connected devices and maintain an updated asset register to quickly respond to incidents. Once a patch or firmware update is released by Signify, prompt testing and deployment are critical. Additionally, limiting the exposure of device management interfaces to the internet and enforcing strong network access controls will reduce attack surface. Engaging with Signify support channels for updates and guidance is recommended.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-08-17T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68c9a92f69caf095b57bf384

Added to database: 9/16/2025, 6:15:11 PM

Last enriched: 9/24/2025, 1:09:43 AM

Last updated: 11/2/2025, 12:22:59 PM

Views: 33

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats