CVE-2025-59109: CWE-1295: Debug Messages Revealing Unnecessary Information in dormakaba dormakaba registration unit 9002
CVE-2025-59109 is a medium severity vulnerability affecting dormakaba registration unit 9002 PIN pads. The device exposes a UART interface on its backside that transmits every button press, including PIN entries, in clear text. An attacker with physical access can remove the device, install a hardware implant connected to the UART, and exfiltrate PIN data wirelessly. This vulnerability requires physical access and user interaction to exploit but can lead to significant confidentiality breaches. No known exploits are currently in the wild. The affected versions are those with software versions below SW0039. The vulnerability impacts the confidentiality of PIN data but does not affect integrity or availability. European organizations using these devices in access control systems are at risk, especially in sectors with high physical security needs. Mitigation involves restricting physical access, monitoring for device tampering, and updating to patched versions once available. Countries with widespread dormakaba deployments and critical infrastructure are most likely to be affected.
AI Analysis
Technical Summary
The dormakaba registration unit 9002, a PIN pad device used in access control systems, contains a hardware vulnerability identified as CVE-2025-59109. The device has an exposed UART header on its backside that transmits every button press, including sensitive PIN entries, in an unencrypted form. This design flaw allows an attacker with physical access to the device to remove it and install a hardware implant that connects to the UART interface. The implant can then exfiltrate the captured PIN data to an external system, for example via WiFi, without requiring any software-level exploitation or authentication. The vulnerability affects all versions of the device with software versions below SW0039. The attack vector relies on physical access and the ability to tamper with the hardware, which is facilitated by the device's plug-and-play design intended for easy replacement. Although no known exploits are currently reported in the wild, the vulnerability poses a significant risk to the confidentiality of PIN codes used for access control. The CVSS 4.0 score is 5.1 (medium severity), reflecting the need for physical access, low attack complexity, no privileges required, and high impact on confidentiality. The vulnerability does not affect integrity or availability of the device or system. This issue is categorized under CWE-1295, indicating debug messages or information leakage that reveals unnecessary sensitive information. The vulnerability is particularly concerning for organizations relying on dormakaba registration units for secure physical access, as compromised PINs could lead to unauthorized entry and potential downstream security breaches.
Potential Impact
The primary impact of CVE-2025-59109 is the compromise of confidentiality of PIN codes entered on dormakaba registration unit 9002 devices. For European organizations, especially those in critical infrastructure, government, finance, healthcare, and large enterprises with physical access control systems, this vulnerability could enable attackers to bypass physical security controls by obtaining PINs covertly. Unauthorized access could lead to theft, espionage, or sabotage. Since the attack requires physical access and hardware tampering, organizations with less stringent physical security controls are at higher risk. The ease of implanting a hardware device that exfiltrates data wirelessly increases the stealth and persistence of the attack. The vulnerability does not directly affect system availability or data integrity but can facilitate further attacks once physical access is gained. The lack of known exploits in the wild currently limits immediate risk, but the vulnerability's nature makes it a significant concern for environments where dormakaba devices are deployed at scale. Organizations in Europe with large deployments of dormakaba access control systems should consider this a moderate risk that could escalate if exploited.
Mitigation Recommendations
1. Physically secure all dormakaba registration unit 9002 devices to prevent unauthorized removal or tampering, including installing tamper-evident seals and monitoring devices with physical intrusion detection. 2. Restrict physical access to areas where these PIN pads are installed, using surveillance cameras and access logs to detect suspicious activity. 3. Conduct regular inspections of the devices to identify any unauthorized hardware implants or modifications. 4. Coordinate with dormakaba to obtain and deploy software updates or patches as soon as they become available (versions SW0039 or later). 5. Consider deploying additional authentication factors or alternative access control methods that do not rely solely on PIN entry to reduce reliance on vulnerable devices. 6. Educate security personnel and users about the risks of physical tampering and encourage prompt reporting of any anomalies. 7. Implement network segmentation and monitoring for any wireless signals in proximity to the devices that could indicate data exfiltration attempts. 8. Maintain an asset inventory and lifecycle management process to track device versions and ensure timely upgrades.
Affected Countries
Germany, France, United Kingdom, Netherlands, Switzerland, Belgium, Italy, Spain, Sweden, Austria
CVE-2025-59109: CWE-1295: Debug Messages Revealing Unnecessary Information in dormakaba dormakaba registration unit 9002
Description
CVE-2025-59109 is a medium severity vulnerability affecting dormakaba registration unit 9002 PIN pads. The device exposes a UART interface on its backside that transmits every button press, including PIN entries, in clear text. An attacker with physical access can remove the device, install a hardware implant connected to the UART, and exfiltrate PIN data wirelessly. This vulnerability requires physical access and user interaction to exploit but can lead to significant confidentiality breaches. No known exploits are currently in the wild. The affected versions are those with software versions below SW0039. The vulnerability impacts the confidentiality of PIN data but does not affect integrity or availability. European organizations using these devices in access control systems are at risk, especially in sectors with high physical security needs. Mitigation involves restricting physical access, monitoring for device tampering, and updating to patched versions once available. Countries with widespread dormakaba deployments and critical infrastructure are most likely to be affected.
AI-Powered Analysis
Technical Analysis
The dormakaba registration unit 9002, a PIN pad device used in access control systems, contains a hardware vulnerability identified as CVE-2025-59109. The device has an exposed UART header on its backside that transmits every button press, including sensitive PIN entries, in an unencrypted form. This design flaw allows an attacker with physical access to the device to remove it and install a hardware implant that connects to the UART interface. The implant can then exfiltrate the captured PIN data to an external system, for example via WiFi, without requiring any software-level exploitation or authentication. The vulnerability affects all versions of the device with software versions below SW0039. The attack vector relies on physical access and the ability to tamper with the hardware, which is facilitated by the device's plug-and-play design intended for easy replacement. Although no known exploits are currently reported in the wild, the vulnerability poses a significant risk to the confidentiality of PIN codes used for access control. The CVSS 4.0 score is 5.1 (medium severity), reflecting the need for physical access, low attack complexity, no privileges required, and high impact on confidentiality. The vulnerability does not affect integrity or availability of the device or system. This issue is categorized under CWE-1295, indicating debug messages or information leakage that reveals unnecessary sensitive information. The vulnerability is particularly concerning for organizations relying on dormakaba registration units for secure physical access, as compromised PINs could lead to unauthorized entry and potential downstream security breaches.
Potential Impact
The primary impact of CVE-2025-59109 is the compromise of confidentiality of PIN codes entered on dormakaba registration unit 9002 devices. For European organizations, especially those in critical infrastructure, government, finance, healthcare, and large enterprises with physical access control systems, this vulnerability could enable attackers to bypass physical security controls by obtaining PINs covertly. Unauthorized access could lead to theft, espionage, or sabotage. Since the attack requires physical access and hardware tampering, organizations with less stringent physical security controls are at higher risk. The ease of implanting a hardware device that exfiltrates data wirelessly increases the stealth and persistence of the attack. The vulnerability does not directly affect system availability or data integrity but can facilitate further attacks once physical access is gained. The lack of known exploits in the wild currently limits immediate risk, but the vulnerability's nature makes it a significant concern for environments where dormakaba devices are deployed at scale. Organizations in Europe with large deployments of dormakaba access control systems should consider this a moderate risk that could escalate if exploited.
Mitigation Recommendations
1. Physically secure all dormakaba registration unit 9002 devices to prevent unauthorized removal or tampering, including installing tamper-evident seals and monitoring devices with physical intrusion detection. 2. Restrict physical access to areas where these PIN pads are installed, using surveillance cameras and access logs to detect suspicious activity. 3. Conduct regular inspections of the devices to identify any unauthorized hardware implants or modifications. 4. Coordinate with dormakaba to obtain and deploy software updates or patches as soon as they become available (versions SW0039 or later). 5. Consider deploying additional authentication factors or alternative access control methods that do not rely solely on PIN entry to reduce reliance on vulnerable devices. 6. Educate security personnel and users about the risks of physical tampering and encourage prompt reporting of any anomalies. 7. Implement network segmentation and monitoring for any wireless signals in proximity to the devices that could indicate data exfiltration attempts. 8. Maintain an asset inventory and lifecycle management process to track device versions and ensure timely upgrades.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- SEC-VLab
- Date Reserved
- 2025-09-09T07:53:12.880Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6977400b4623b1157c815ee5
Added to database: 1/26/2026, 10:20:59 AM
Last enriched: 1/26/2026, 10:37:34 AM
Last updated: 1/26/2026, 6:59:19 PM
Views: 11
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14756: CWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection') in TP-Link Systems Inc. Archer MR600 v5.0
HighCVE-2026-24439: CWE-116 Improper Encoding or Escaping of Output in Shenzhen Tenda Technology Co., Ltd. W30E V2
LowCVE-2026-24435: CWE-942 Permissive Cross-domain Security Policy with Untrusted Domains in Shenzhen Tenda Technology Co., Ltd. W30E V2
HighCVE-2026-24432: CWE-352 Cross-Site Request Forgery (CSRF) in Shenzhen Tenda Technology Co., Ltd. W30E V2
MediumCVE-2026-0925: Improper Validation of Specified Quantity in Input in Tanium Discover
LowActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.