CVE-2025-67135: n/a
CVE-2025-67135 is a vulnerability in the PF-50 1. 2 keyfob of the PGST PG107 Alarm System version 1. 25. 05. hf that allows attackers to bypass access control through a code replay attack. This weakness in the keyfob’s security protocol enables adversaries to capture and reuse valid authentication codes, potentially granting unauthorized physical access. Although no known exploits are currently active in the wild, the vulnerability poses a significant risk to physical security systems relying on this device. European organizations using the PGST PG107 Alarm System could face unauthorized entry, compromising facility security and safety. Mitigation requires implementing stronger cryptographic protections, such as rolling codes or challenge-response authentication, and updating or replacing vulnerable keyfobs. Countries with higher adoption of PGST alarm systems and critical infrastructure protected by these devices are at greater risk.
AI Analysis
Technical Summary
The vulnerability identified as CVE-2025-67135 affects the PF-50 1.2 keyfob component of the PGST PG107 Alarm System version 1.25.05.hf. The core issue is a weak security design that permits a code replay attack, where an attacker can intercept the wireless communication between the keyfob and the alarm system and later retransmit the captured code to gain unauthorized access. This type of attack exploits the absence of robust cryptographic measures such as rolling codes or mutual authentication, which are standard in modern access control systems to prevent replay attacks. The vulnerability does not require user interaction or authentication, making it easier for attackers to exploit if they are within wireless range. Although no public exploits have been reported yet, the potential for physical security breaches is significant, as unauthorized individuals could unlock doors or disable alarms. The lack of a CVSS score indicates this is a newly published vulnerability with limited public data, but the technical details suggest a critical flaw in the access control mechanism. The vulnerability affects physical security systems widely used in commercial and residential environments, emphasizing the need for urgent mitigation. The absence of patch links suggests that a fix may not yet be available, increasing the urgency for interim protective measures.
Potential Impact
For European organizations, the impact of this vulnerability could be severe, especially for entities relying on the PGST PG107 Alarm System for physical security, such as corporate offices, government buildings, and critical infrastructure facilities. Unauthorized access could lead to theft, sabotage, or espionage, compromising both physical assets and sensitive information. The vulnerability undermines the integrity and availability of access control systems, potentially allowing attackers to disable alarms or gain entry without detection. This could result in operational disruptions, financial losses, and reputational damage. Additionally, organizations in sectors with strict regulatory compliance requirements for physical security may face legal and compliance risks if exploited. The threat is particularly relevant for environments where the PGST PG107 system is deployed extensively, and where alternative security layers are minimal or absent. Given the wireless nature of the attack, attackers only need proximity to the target, increasing the risk in densely populated or high-traffic areas.
Mitigation Recommendations
To mitigate this vulnerability, organizations should first identify all deployed PGST PG107 Alarm Systems and specifically the PF-50 1.2 keyfobs. Since no patches are currently available, immediate steps include disabling wireless keyfob access where feasible and switching to alternative authentication methods such as wired keypads or biometric systems. Implementing physical security controls like surveillance cameras and security personnel can help detect unauthorized access attempts. Organizations should engage with the vendor to obtain firmware updates or replacement devices that incorporate rolling code technology or challenge-response authentication to prevent replay attacks. Network segmentation and monitoring of alarm system communications can help detect anomalous activity indicative of replay attacks. Additionally, educating security staff about this vulnerability and encouraging vigilance for suspicious behavior near access points is critical. Long-term mitigation involves upgrading to alarm systems with proven cryptographic protections and regularly reviewing physical security policies to address emerging threats.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden
CVE-2025-67135: n/a
Description
CVE-2025-67135 is a vulnerability in the PF-50 1. 2 keyfob of the PGST PG107 Alarm System version 1. 25. 05. hf that allows attackers to bypass access control through a code replay attack. This weakness in the keyfob’s security protocol enables adversaries to capture and reuse valid authentication codes, potentially granting unauthorized physical access. Although no known exploits are currently active in the wild, the vulnerability poses a significant risk to physical security systems relying on this device. European organizations using the PGST PG107 Alarm System could face unauthorized entry, compromising facility security and safety. Mitigation requires implementing stronger cryptographic protections, such as rolling codes or challenge-response authentication, and updating or replacing vulnerable keyfobs. Countries with higher adoption of PGST alarm systems and critical infrastructure protected by these devices are at greater risk.
AI-Powered Analysis
Technical Analysis
The vulnerability identified as CVE-2025-67135 affects the PF-50 1.2 keyfob component of the PGST PG107 Alarm System version 1.25.05.hf. The core issue is a weak security design that permits a code replay attack, where an attacker can intercept the wireless communication between the keyfob and the alarm system and later retransmit the captured code to gain unauthorized access. This type of attack exploits the absence of robust cryptographic measures such as rolling codes or mutual authentication, which are standard in modern access control systems to prevent replay attacks. The vulnerability does not require user interaction or authentication, making it easier for attackers to exploit if they are within wireless range. Although no public exploits have been reported yet, the potential for physical security breaches is significant, as unauthorized individuals could unlock doors or disable alarms. The lack of a CVSS score indicates this is a newly published vulnerability with limited public data, but the technical details suggest a critical flaw in the access control mechanism. The vulnerability affects physical security systems widely used in commercial and residential environments, emphasizing the need for urgent mitigation. The absence of patch links suggests that a fix may not yet be available, increasing the urgency for interim protective measures.
Potential Impact
For European organizations, the impact of this vulnerability could be severe, especially for entities relying on the PGST PG107 Alarm System for physical security, such as corporate offices, government buildings, and critical infrastructure facilities. Unauthorized access could lead to theft, sabotage, or espionage, compromising both physical assets and sensitive information. The vulnerability undermines the integrity and availability of access control systems, potentially allowing attackers to disable alarms or gain entry without detection. This could result in operational disruptions, financial losses, and reputational damage. Additionally, organizations in sectors with strict regulatory compliance requirements for physical security may face legal and compliance risks if exploited. The threat is particularly relevant for environments where the PGST PG107 system is deployed extensively, and where alternative security layers are minimal or absent. Given the wireless nature of the attack, attackers only need proximity to the target, increasing the risk in densely populated or high-traffic areas.
Mitigation Recommendations
To mitigate this vulnerability, organizations should first identify all deployed PGST PG107 Alarm Systems and specifically the PF-50 1.2 keyfobs. Since no patches are currently available, immediate steps include disabling wireless keyfob access where feasible and switching to alternative authentication methods such as wired keypads or biometric systems. Implementing physical security controls like surveillance cameras and security personnel can help detect unauthorized access attempts. Organizations should engage with the vendor to obtain firmware updates or replacement devices that incorporate rolling code technology or challenge-response authentication to prevent replay attacks. Network segmentation and monitoring of alarm system communications can help detect anomalous activity indicative of replay attacks. Additionally, educating security staff about this vulnerability and encouraging vigilance for suspicious behavior near access points is critical. Long-term mitigation involves upgrading to alarm systems with proven cryptographic protections and regularly reviewing physical security policies to address emerging threats.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2025-12-08T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 698d0a3b4b57a58fa1d8b228
Added to database: 2/11/2026, 11:01:15 PM
Last enriched: 2/11/2026, 11:15:33 PM
Last updated: 2/12/2026, 12:50:47 AM
Views: 2
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-20700: An attacker with memory write capability may be able to execute arbitrary code. Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals on versions of iOS before iOS 26. CVE-2025-14174 and CVE-2025-43529 were also issued in response to this report. in Apple macOS
CriticalCVE-2026-20682: An attacker may be able to discover a user’s deleted notes in Apple iOS and iPadOS
HighCVE-2026-20681: An app may be able to access information about a user's contacts in Apple macOS
MediumCVE-2026-20680: A sandboxed app may be able to access sensitive user data in Apple macOS
HighCVE-2026-20678: An app may be able to access sensitive user data in Apple iOS and iPadOS
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.