Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-65552: n/a

0
Critical
VulnerabilityCVE-2025-65552cvecve-2025-65552
Published: Mon Jan 12 2026 (01/12/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

D3D Wi-Fi Home Security System ZX-G12 v2.1.1 is vulnerable to RF replay attacks on the 433 MHz sensor communication channel. The system does not implement rolling codes, message authentication, or anti-replay protection, allowing an attacker within RF range to record valid alarm/control frames and replay them to trigger false alarms.

AI-Powered Analysis

AILast updated: 01/19/2026, 19:37:11 UTC

Technical Analysis

The D3D Wi-Fi Home Security System ZX-G12 version 2.1.1 suffers from a critical security vulnerability identified as CVE-2025-65552. The system communicates with its sensors over a 433 MHz RF channel but lacks fundamental security mechanisms such as rolling codes, message authentication codes (MAC), and anti-replay protections. These omissions allow an attacker within RF range to passively capture valid alarm or control frames transmitted by legitimate sensors or controllers. The attacker can then replay these captured frames to the system, causing it to accept the replayed signals as genuine. This replay attack can trigger false alarms or unauthorized control commands, undermining the system’s reliability and trustworthiness. The vulnerability is classified under CWE-294 (Authentication Bypass by Capture-Replay). The CVSS v3.1 base score of 9.8 reflects the vulnerability’s critical nature, with network attack vector, no required privileges or user interaction, and high impact on confidentiality, integrity, and availability. No patches or firmware updates are currently available, and no exploits have been observed in the wild yet. The lack of cryptographic protections in the communication protocol is the root cause, making the system vulnerable to straightforward RF replay attacks.

Potential Impact

For European organizations, especially residential users, small businesses, and property management firms relying on the D3D ZX-G12 system, this vulnerability can lead to frequent false alarms, causing operational disruptions and potential desensitization to real security events. False alarms may also incur financial penalties from local authorities or emergency services. Attackers could exploit this to create distractions or cover for other malicious activities. The integrity and availability of the security system are compromised, reducing trust in the system’s alerts and controls. Confidentiality is also impacted as attackers can infer system states by monitoring RF communications. The absence of known exploits in the wild suggests a window for proactive mitigation, but the critical severity demands urgent attention. The impact is more pronounced in densely populated urban areas where RF range overlaps are common, increasing the likelihood of attackers being within range.

Mitigation Recommendations

Immediate mitigation steps include: 1) Contacting the vendor for firmware updates or security patches that implement rolling codes, message authentication, and anti-replay mechanisms. 2) If no updates are available, consider replacing the vulnerable system with a security solution that uses cryptographically secured RF communications. 3) Physically securing the system’s sensors and controllers to limit attacker proximity and RF interception opportunities. 4) Employ RF shielding or signal jamming countermeasures where legally permissible to reduce the effective attack range. 5) Implement monitoring and alerting for unusual alarm patterns that may indicate replay attacks. 6) Educate users and security personnel about the risk of false alarms and the importance of verifying alarms before response. 7) Regularly audit and test the security system for anomalous behavior. These steps go beyond generic advice by focusing on the unique RF replay attack vector and the lack of cryptographic protections.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-11-18T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69650e81da2266e838bdb80f

Added to database: 1/12/2026, 3:08:49 PM

Last enriched: 1/19/2026, 7:37:11 PM

Last updated: 2/7/2026, 4:09:26 AM

Views: 36

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats