Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-65553: n/a

0
Medium
VulnerabilityCVE-2025-65553cvecve-2025-65553
Published: Mon Jan 12 2026 (01/12/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

D3D Wi-Fi Home Security System ZX-G12 v2.1.17 is susceptible to RF jamming on the 433 MHz alarm sensor channel. An attacker within RF range can transmit continuous interference to block sensor transmissions, resulting in missed alarms and loss of security monitoring. The device lacks jamming detection or mitigations, creating a denial-of-service condition that may lead to undetected intrusions or failure to trigger safety alerts.

AI-Powered Analysis

AILast updated: 01/19/2026, 19:37:30 UTC

Technical Analysis

The vulnerability identified as CVE-2025-65553 affects the D3D Wi-Fi Home Security System ZX-G12 version 2.1.17, specifically targeting the 433 MHz frequency band used by its alarm sensors. The attack vector involves an adversary transmitting continuous radio frequency interference within the operational range of the sensors, effectively jamming the communication channel. This RF jamming prevents the sensors from sending alarm signals to the central security system, resulting in a denial-of-service (DoS) condition. The system does not incorporate any detection or mitigation techniques against jamming attacks, such as signal quality monitoring, frequency hopping, or fallback communication channels. Consequently, the attacker can cause the system to miss alarms, leading to a failure in triggering safety alerts during intrusion attempts or emergencies. The CVSS score of 6.5 reflects the medium severity, with the attack requiring adjacent network access (physical proximity), no privileges, and no user interaction. The impact is limited to availability, with no direct compromise of confidentiality or integrity. No patches or firmware updates are currently available, and no exploits have been reported in the wild. This vulnerability falls under CWE-294, which concerns improper authentication or verification mechanisms, here manifesting as a lack of jamming detection. The threat highlights the risks inherent in RF-based security systems that do not implement robust anti-jamming measures.

Potential Impact

For European organizations, the primary impact of this vulnerability is the potential loss of physical security monitoring due to sensor communication disruption. This can lead to undetected intrusions, theft, or safety incidents, especially in environments relying heavily on the D3D Wi-Fi Home Security System ZX-G12 or similar RF-based alarm systems. Critical infrastructure facilities, residential complexes, and small to medium enterprises using these systems may experience increased risk exposure. The denial-of-service condition could delay incident response and forensic investigations, undermining trust in security operations. While confidentiality and integrity of data are not directly affected, the availability impact can have significant operational consequences. The lack of jamming detection means organizations cannot easily identify or respond to ongoing attacks, complicating incident management. Additionally, the attack requires physical proximity, which may limit the threat to locations accessible to attackers, but this is a realistic scenario in urban or densely populated areas. Overall, the vulnerability could degrade the effectiveness of physical security controls across affected European sectors.

Mitigation Recommendations

To mitigate this vulnerability, organizations should implement layered physical and technical controls. First, increase physical security measures to restrict attacker proximity to the premises, such as surveillance cameras, access controls, and patrols. Deploy RF spectrum monitoring tools to detect abnormal interference patterns on the 433 MHz band, enabling early identification of jamming attempts. Engage with the vendor to request firmware updates or patches that introduce anti-jamming features like frequency hopping, signal strength analysis, or fallback communication channels. Consider supplementing or replacing vulnerable RF-based sensors with wired or alternative wireless technologies less susceptible to jamming. Conduct regular security assessments and penetration tests focusing on physical and RF attack vectors. Train security personnel to recognize signs of jamming and establish incident response procedures for suspected RF interference. Finally, maintain an inventory of all deployed security devices and their firmware versions to ensure timely updates when available.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-11-18T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69650e81da2266e838bdb813

Added to database: 1/12/2026, 3:08:49 PM

Last enriched: 1/19/2026, 7:37:30 PM

Last updated: 2/27/2026, 3:57:35 AM

Views: 78

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses