Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-59109: CWE-1295: Debug Messages Revealing Unnecessary Information in dormakaba dormakaba registration unit 9002

0
Medium
VulnerabilityCVE-2025-59109cvecve-2025-59109cwe-1295
Published: Mon Jan 26 2026 (01/26/2026, 10:06:45 UTC)
Source: CVE Database V5
Vendor/Project: dormakaba
Product: dormakaba registration unit 9002

Description

The dormakaba registration units 9002 (PIN Pad Units) have an exposed UART header on the backside. The PIN pad is sending every button press to the UART interface. An attacker can use the interface to exfiltrate PINs. As the devices are explicitly built as Plug-and-Play to be easily replaced, an attacker is easily able to remove the device, install a hardware implant which connects to the UART and exfiltrates the data exposed via UART to another system (e.g. via WiFi).

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/04/2026, 18:33:38 UTC

Technical Analysis

CVE-2025-59109 identifies a vulnerability in the dormakaba registration unit 9002 PIN pads, where an exposed UART header on the device's backside transmits every button press, including sensitive PIN entries, in clear text. This hardware debug interface was intended for development but remains accessible in production devices, leaking critical input data. The vulnerability is classified under CWE-1295, indicating debug messages revealing unnecessary information. An attacker with physical access can remove the PIN pad, install a hardware implant that connects to the UART interface, and exfiltrate PIN data wirelessly (e.g., via WiFi). The device's plug-and-play design facilitates easy removal and replacement, lowering the barrier for such attacks. The affected versions are those with firmware below SW0039. The CVSS 4.0 vector (AV:P/AC:L/AT:N/PR:N/UI:A/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N) reflects that exploitation requires physical access but no privileges or authentication, with user interaction needed (pressing buttons). The vulnerability impacts confidentiality severely (PIN leakage), but integrity and availability are not affected. No patches are currently linked, and no exploits are known in the wild. This vulnerability poses a significant risk to environments relying on these PIN pads for secure authentication or access control, as compromised PINs can lead to unauthorized access.

Potential Impact

The primary impact is the compromise of PIN confidentiality, which can lead to unauthorized physical or logical access if attackers obtain valid credentials. Organizations using dormakaba registration unit 9002 PIN pads for access control, time attendance, or secure authentication may face increased risk of insider threats or external attackers gaining entry. The ease of physical removal and implant installation means that facilities with insufficient physical security controls are particularly vulnerable. While the vulnerability does not affect system integrity or availability directly, the loss of credential confidentiality can cascade into broader security breaches. The attack requires physical access, so environments with high foot traffic or less controlled hardware access points are at greater risk. The absence of known exploits in the wild suggests this is a latent threat, but the medium CVSS score reflects the realistic potential for exploitation in targeted attacks. The lack of firmware patches increases exposure duration. Organizations may also face compliance and reputational risks if PIN data is leaked.

Mitigation Recommendations

1. Enforce strict physical security controls around PIN pad devices to prevent unauthorized removal or tampering, including surveillance and tamper-evident seals. 2. Regularly inspect devices for signs of hardware implants or unauthorized modifications. 3. Restrict access to areas where PIN pads are installed to trusted personnel only. 4. Coordinate with dormakaba to obtain firmware updates beyond version SW0039 that address this vulnerability and apply them promptly. 5. Consider deploying additional authentication factors or alternative input methods that do not expose sensitive data via hardware interfaces. 6. Implement network monitoring to detect unusual wireless signals near PIN pad locations that could indicate data exfiltration attempts. 7. Educate staff on the risks of physical device tampering and encourage reporting of suspicious activity. 8. For new deployments, evaluate alternative devices that do not expose debug interfaces or sensitive input data. 9. If possible, disable or physically block access to the UART header on existing devices to prevent hardware implants. 10. Maintain an inventory of all PIN pad devices and their firmware versions to ensure timely vulnerability management.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
SEC-VLab
Date Reserved
2025-09-09T07:53:12.880Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6977400b4623b1157c815ee5

Added to database: 1/26/2026, 10:20:59 AM

Last enriched: 3/4/2026, 6:33:38 PM

Last updated: 3/25/2026, 3:16:15 AM

Views: 104

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses