Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-9964: CWE-521 Weak Password Requirements in Novakon P series

0
High
VulnerabilityCVE-2025-9964cvecve-2025-9964cwe-521
Published: Tue Sep 23 2025 (09/23/2025, 11:33:13 UTC)
Source: CVE Database V5
Vendor/Project: Novakon
Product: P series

Description

No password for the root user is set in Novakon P series. This allows phyiscal attackers to enter the console easily. This issue affects P series: P – V2001.A.C518o2.

AI-Powered Analysis

AILast updated: 11/04/2025, 02:46:13 UTC

Technical Analysis

CVE-2025-9964 identifies a critical security weakness in the Novakon P series device firmware version P – V2001.A.C518o2, where the root user account is configured without any password. This vulnerability falls under CWE-521, which relates to weak password requirements. The absence of a root password means that anyone with physical access to the device can directly access the console interface without any authentication barrier. This direct console access allows attackers to execute arbitrary commands with root privileges, potentially leading to full system compromise, data theft, or disruption of device operations. The vulnerability is rated with a CVSS 4.0 score of 8.6, indicating high severity, primarily due to the high impact on confidentiality, integrity, and availability, combined with low attack complexity and no need for authentication or user interaction. The attack vector is physical access, which limits remote exploitation but poses a significant risk in environments where devices are accessible to unauthorized personnel. No patches or fixes have been published yet, and no known exploits are currently in the wild. The vulnerability highlights a critical security oversight in the device’s default configuration, emphasizing the need for secure credential management and physical security controls.

Potential Impact

For European organizations, this vulnerability poses a substantial risk, particularly in industrial, manufacturing, or critical infrastructure sectors where Novakon P series devices might be deployed. The lack of root password protection can lead to unauthorized physical access resulting in full control over the device. This can cause operational disruptions, data breaches, or sabotage of industrial processes. The impact is especially severe in environments where devices are located in less secure areas or where physical access controls are weak. Confidentiality is compromised as attackers can access sensitive configuration and operational data. Integrity is at risk since attackers can alter device settings or firmware. Availability can be affected if attackers disrupt device functionality. Given the high CVSS score and the nature of the vulnerability, European organizations must prioritize addressing this issue to prevent potential safety and operational hazards.

Mitigation Recommendations

1. Immediately set strong, unique passwords for the root user on all affected Novakon P series devices. 2. Implement strict physical security controls to restrict unauthorized access to devices, including locked cabinets, surveillance, and access logging. 3. Conduct an inventory audit to identify all devices running the vulnerable firmware version. 4. Monitor device logs for any unauthorized access attempts or suspicious activity. 5. Engage with Novakon for firmware updates or patches addressing this vulnerability and apply them as soon as they become available. 6. Consider network segmentation to isolate vulnerable devices from critical network segments to limit potential lateral movement. 7. Train personnel on the importance of physical security and secure device configuration. 8. If possible, disable unused console ports or interfaces to reduce attack surface. 9. Establish incident response procedures specifically for physical security breaches involving these devices.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
CyberDanube
Date Reserved
2025-09-03T20:34:19.027Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68d336ad712f26b964ce8e82

Added to database: 9/24/2025, 12:09:17 AM

Last enriched: 11/4/2025, 2:46:13 AM

Last updated: 11/22/2025, 1:45:15 PM

Views: 58

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats