CVE-2025-65552: n/a
D3D Wi-Fi Home Security System ZX-G12 v2.1.1 is vulnerable to RF replay attacks on the 433 MHz sensor communication channel. The system does not implement rolling codes, message authentication, or anti-replay protection, allowing an attacker within RF range to record valid alarm/control frames and replay them to trigger false alarms.
AI Analysis
Technical Summary
The D3D Wi-Fi Home Security System ZX-G12 version 2.1.1 suffers from a critical security vulnerability identified as CVE-2025-65552. The system communicates with its sensors over a 433 MHz RF channel but lacks fundamental security mechanisms such as rolling codes, message authentication codes (MAC), and anti-replay protections. These omissions allow an attacker within RF range to passively capture valid alarm or control frames transmitted by legitimate sensors or controllers. The attacker can then replay these captured frames to the system, causing it to accept the replayed signals as genuine. This replay attack can trigger false alarms or unauthorized control commands, undermining the system’s reliability and trustworthiness. The vulnerability is classified under CWE-294 (Authentication Bypass by Capture-Replay). The CVSS v3.1 base score of 9.8 reflects the vulnerability’s critical nature, with network attack vector, no required privileges or user interaction, and high impact on confidentiality, integrity, and availability. No patches or firmware updates are currently available, and no exploits have been observed in the wild yet. The lack of cryptographic protections in the communication protocol is the root cause, making the system vulnerable to straightforward RF replay attacks.
Potential Impact
For European organizations, especially residential users, small businesses, and property management firms relying on the D3D ZX-G12 system, this vulnerability can lead to frequent false alarms, causing operational disruptions and potential desensitization to real security events. False alarms may also incur financial penalties from local authorities or emergency services. Attackers could exploit this to create distractions or cover for other malicious activities. The integrity and availability of the security system are compromised, reducing trust in the system’s alerts and controls. Confidentiality is also impacted as attackers can infer system states by monitoring RF communications. The absence of known exploits in the wild suggests a window for proactive mitigation, but the critical severity demands urgent attention. The impact is more pronounced in densely populated urban areas where RF range overlaps are common, increasing the likelihood of attackers being within range.
Mitigation Recommendations
Immediate mitigation steps include: 1) Contacting the vendor for firmware updates or security patches that implement rolling codes, message authentication, and anti-replay mechanisms. 2) If no updates are available, consider replacing the vulnerable system with a security solution that uses cryptographically secured RF communications. 3) Physically securing the system’s sensors and controllers to limit attacker proximity and RF interception opportunities. 4) Employ RF shielding or signal jamming countermeasures where legally permissible to reduce the effective attack range. 5) Implement monitoring and alerting for unusual alarm patterns that may indicate replay attacks. 6) Educate users and security personnel about the risk of false alarms and the importance of verifying alarms before response. 7) Regularly audit and test the security system for anomalous behavior. These steps go beyond generic advice by focusing on the unique RF replay attack vector and the lack of cryptographic protections.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands
CVE-2025-65552: n/a
Description
D3D Wi-Fi Home Security System ZX-G12 v2.1.1 is vulnerable to RF replay attacks on the 433 MHz sensor communication channel. The system does not implement rolling codes, message authentication, or anti-replay protection, allowing an attacker within RF range to record valid alarm/control frames and replay them to trigger false alarms.
AI-Powered Analysis
Technical Analysis
The D3D Wi-Fi Home Security System ZX-G12 version 2.1.1 suffers from a critical security vulnerability identified as CVE-2025-65552. The system communicates with its sensors over a 433 MHz RF channel but lacks fundamental security mechanisms such as rolling codes, message authentication codes (MAC), and anti-replay protections. These omissions allow an attacker within RF range to passively capture valid alarm or control frames transmitted by legitimate sensors or controllers. The attacker can then replay these captured frames to the system, causing it to accept the replayed signals as genuine. This replay attack can trigger false alarms or unauthorized control commands, undermining the system’s reliability and trustworthiness. The vulnerability is classified under CWE-294 (Authentication Bypass by Capture-Replay). The CVSS v3.1 base score of 9.8 reflects the vulnerability’s critical nature, with network attack vector, no required privileges or user interaction, and high impact on confidentiality, integrity, and availability. No patches or firmware updates are currently available, and no exploits have been observed in the wild yet. The lack of cryptographic protections in the communication protocol is the root cause, making the system vulnerable to straightforward RF replay attacks.
Potential Impact
For European organizations, especially residential users, small businesses, and property management firms relying on the D3D ZX-G12 system, this vulnerability can lead to frequent false alarms, causing operational disruptions and potential desensitization to real security events. False alarms may also incur financial penalties from local authorities or emergency services. Attackers could exploit this to create distractions or cover for other malicious activities. The integrity and availability of the security system are compromised, reducing trust in the system’s alerts and controls. Confidentiality is also impacted as attackers can infer system states by monitoring RF communications. The absence of known exploits in the wild suggests a window for proactive mitigation, but the critical severity demands urgent attention. The impact is more pronounced in densely populated urban areas where RF range overlaps are common, increasing the likelihood of attackers being within range.
Mitigation Recommendations
Immediate mitigation steps include: 1) Contacting the vendor for firmware updates or security patches that implement rolling codes, message authentication, and anti-replay mechanisms. 2) If no updates are available, consider replacing the vulnerable system with a security solution that uses cryptographically secured RF communications. 3) Physically securing the system’s sensors and controllers to limit attacker proximity and RF interception opportunities. 4) Employ RF shielding or signal jamming countermeasures where legally permissible to reduce the effective attack range. 5) Implement monitoring and alerting for unusual alarm patterns that may indicate replay attacks. 6) Educate users and security personnel about the risk of false alarms and the importance of verifying alarms before response. 7) Regularly audit and test the security system for anomalous behavior. These steps go beyond generic advice by focusing on the unique RF replay attack vector and the lack of cryptographic protections.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2025-11-18T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 69650e81da2266e838bdb80f
Added to database: 1/12/2026, 3:08:49 PM
Last enriched: 1/19/2026, 7:37:11 PM
Last updated: 2/7/2026, 4:09:26 AM
Views: 36
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.