Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-9964: CWE-521 Weak Password Requirements in Novakon P series

0
High
VulnerabilityCVE-2025-9964cvecve-2025-9964cwe-521
Published: Tue Sep 23 2025 (09/23/2025, 11:33:13 UTC)
Source: CVE Database V5
Vendor/Project: Novakon
Product: P series

Description

No password for the root user is set in Novakon P series. This allows phyiscal attackers to enter the console easily. This issue affects P series: P – V2001.A.C518o2.

AI-Powered Analysis

AILast updated: 09/24/2025, 00:11:41 UTC

Technical Analysis

CVE-2025-9964 is a high-severity vulnerability identified in the Novakon P series industrial control devices, specifically version P – V2001.A.C518o2. The core issue is the absence of a password set for the root user account, effectively allowing anyone with physical access to the device to gain unrestricted console access. This vulnerability is classified under CWE-521, which pertains to weak or missing password requirements. Since the root account typically has full administrative privileges, an attacker can manipulate device configurations, disrupt operations, or pivot to other parts of the network. The CVSS 4.0 score of 8.6 reflects the critical nature of this vulnerability, with a vector indicating physical attack vector (AV:P), low attack complexity (AC:L), no privileges or user interaction required (PR:N/UI:N), and high impact on confidentiality, integrity, and availability (VC:H/VI:H/VA:H). Although no known exploits are currently reported in the wild, the vulnerability’s nature makes it a significant risk in environments where physical security is not strictly enforced. The lack of a password on the root account is a fundamental security oversight, especially for industrial control systems that often operate critical infrastructure or manufacturing processes. This vulnerability could be exploited by insiders or intruders who gain physical access, potentially leading to operational disruptions, data manipulation, or safety hazards.

Potential Impact

For European organizations, especially those operating in critical infrastructure sectors such as energy, manufacturing, transportation, and utilities, this vulnerability poses a substantial risk. Industrial control systems like the Novakon P series are often integral to operational technology (OT) environments. Unauthorized root access could lead to sabotage, production downtime, or safety incidents, which in turn could have cascading effects on supply chains and public safety. Given the high impact on confidentiality, integrity, and availability, attackers could manipulate device settings, disable safety mechanisms, or exfiltrate sensitive operational data. The physical access requirement somewhat limits remote exploitation, but insider threats or inadequate physical security controls could facilitate attacks. Additionally, compliance with European regulations such as NIS2 Directive and GDPR could be jeopardized if this vulnerability leads to data breaches or service disruptions. The reputational and financial consequences for affected organizations could be severe, including regulatory fines and loss of customer trust.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should immediately verify the firmware version of their Novakon P series devices and confirm whether the root password is set. If the affected version (P – V2001.A.C518o2) is in use, organizations should implement the following specific measures: 1) Physically secure all devices to prevent unauthorized access, including locked cabinets and restricted access areas. 2) Manually set a strong, complex password for the root account if the device allows it, or apply any available vendor patches or firmware updates once released. 3) Implement strict access control policies and monitor physical access logs to detect unauthorized entry attempts. 4) Employ network segmentation to isolate these devices from broader IT networks, limiting potential lateral movement. 5) Conduct regular security audits and penetration tests focusing on physical security and device configurations. 6) Engage with Novakon support to request official patches or guidance and monitor for any future advisories. 7) Train personnel on the importance of physical security and the risks associated with this vulnerability. These targeted actions go beyond generic advice by focusing on the unique combination of physical access and device-specific configuration weaknesses.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
CyberDanube
Date Reserved
2025-09-03T20:34:19.027Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68d336ad712f26b964ce8e82

Added to database: 9/24/2025, 12:09:17 AM

Last enriched: 9/24/2025, 12:11:41 AM

Last updated: 10/7/2025, 6:50:39 AM

Views: 16

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats