CVE-2025-9964: CWE-521 Weak Password Requirements in Novakon P series (P07, P10, P12, P15)
No password for the root user is set in Novakon P series. This allows phyiscal attackers to enter the console easily. This issue affects P series: P – V2001.A.C518o2 until P-2.0.05 Build 2026.02.06 (commit d0f97fd9).
AI Analysis
Technical Summary
CVE-2025-9964 identifies a critical security weakness in the Novakon P series devices (models P07, P10, P12, P15) where the root user account lacks any password protection. This vulnerability stems from weak password requirements classified under CWE-521, effectively leaving the root account open and accessible without authentication. The affected firmware versions range from P – V2001.A.C518o2 through P-2.0.05 Build 2026.02.06. Because the root account is unprotected, any attacker with physical access to the device's console can gain full administrative control, bypassing all security controls. The vulnerability has a CVSS 4.0 base score of 8.6, reflecting its high impact on confidentiality, integrity, and availability, with low attack complexity since no authentication or user interaction is required. The attack vector is physical access, which limits remote exploitation but poses a serious risk in environments where devices are accessible to unauthorized personnel. No patches or mitigations have been officially released yet, and no known exploits have been observed in the wild. This vulnerability is particularly concerning for industrial control systems, embedded devices, or critical infrastructure environments where Novakon P series devices are deployed, as attackers could manipulate device operations, disrupt services, or exfiltrate sensitive data.
Potential Impact
The vulnerability allows an attacker with physical access to gain unrestricted root access to affected Novakon P series devices. This compromises the confidentiality of any sensitive data stored or processed by the device, including configuration and operational data. Integrity is at risk as attackers can modify system settings, firmware, or operational parameters, potentially causing malfunction or sabotage. Availability can be disrupted by attackers who may disable or alter device functions, leading to downtime or safety hazards in industrial or critical infrastructure contexts. The lack of password protection means that even a low-skilled attacker can exploit this vulnerability easily once physical access is obtained. Organizations relying on these devices for operational technology (OT) or embedded control systems face increased risk of insider threats, physical tampering, or supply chain attacks. The absence of known exploits in the wild suggests limited current exploitation but also indicates a window of opportunity for attackers before patches are available.
Mitigation Recommendations
1. Immediately enforce strict physical security controls around all Novakon P series devices to prevent unauthorized physical access, including locked enclosures, surveillance, and access logging. 2. Where possible, restrict console access ports or disable unused physical interfaces to reduce attack surface. 3. Monitor device logs and network traffic for unusual activity that may indicate tampering or unauthorized access attempts. 4. Engage with Novakon support or vendor channels to obtain firmware updates or patches addressing this vulnerability as soon as they become available. 5. Implement network segmentation to isolate vulnerable devices from critical networks, limiting the impact of potential compromise. 6. Consider deploying compensating controls such as hardware security modules or external authentication gateways if supported by the device. 7. Conduct regular security audits and physical inspections of devices to detect signs of tampering. 8. Develop incident response plans specifically addressing physical compromise scenarios for these devices. 9. Educate personnel on the risks of physical access vulnerabilities and enforce strict access policies. 10. If feasible, replace affected devices with versions or models that enforce strong password policies and authentication.
Affected Countries
United States, Germany, China, South Korea, Japan, France, United Kingdom, Canada, Italy, India
CVE-2025-9964: CWE-521 Weak Password Requirements in Novakon P series (P07, P10, P12, P15)
Description
No password for the root user is set in Novakon P series. This allows phyiscal attackers to enter the console easily. This issue affects P series: P – V2001.A.C518o2 until P-2.0.05 Build 2026.02.06 (commit d0f97fd9).
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-9964 identifies a critical security weakness in the Novakon P series devices (models P07, P10, P12, P15) where the root user account lacks any password protection. This vulnerability stems from weak password requirements classified under CWE-521, effectively leaving the root account open and accessible without authentication. The affected firmware versions range from P – V2001.A.C518o2 through P-2.0.05 Build 2026.02.06. Because the root account is unprotected, any attacker with physical access to the device's console can gain full administrative control, bypassing all security controls. The vulnerability has a CVSS 4.0 base score of 8.6, reflecting its high impact on confidentiality, integrity, and availability, with low attack complexity since no authentication or user interaction is required. The attack vector is physical access, which limits remote exploitation but poses a serious risk in environments where devices are accessible to unauthorized personnel. No patches or mitigations have been officially released yet, and no known exploits have been observed in the wild. This vulnerability is particularly concerning for industrial control systems, embedded devices, or critical infrastructure environments where Novakon P series devices are deployed, as attackers could manipulate device operations, disrupt services, or exfiltrate sensitive data.
Potential Impact
The vulnerability allows an attacker with physical access to gain unrestricted root access to affected Novakon P series devices. This compromises the confidentiality of any sensitive data stored or processed by the device, including configuration and operational data. Integrity is at risk as attackers can modify system settings, firmware, or operational parameters, potentially causing malfunction or sabotage. Availability can be disrupted by attackers who may disable or alter device functions, leading to downtime or safety hazards in industrial or critical infrastructure contexts. The lack of password protection means that even a low-skilled attacker can exploit this vulnerability easily once physical access is obtained. Organizations relying on these devices for operational technology (OT) or embedded control systems face increased risk of insider threats, physical tampering, or supply chain attacks. The absence of known exploits in the wild suggests limited current exploitation but also indicates a window of opportunity for attackers before patches are available.
Mitigation Recommendations
1. Immediately enforce strict physical security controls around all Novakon P series devices to prevent unauthorized physical access, including locked enclosures, surveillance, and access logging. 2. Where possible, restrict console access ports or disable unused physical interfaces to reduce attack surface. 3. Monitor device logs and network traffic for unusual activity that may indicate tampering or unauthorized access attempts. 4. Engage with Novakon support or vendor channels to obtain firmware updates or patches addressing this vulnerability as soon as they become available. 5. Implement network segmentation to isolate vulnerable devices from critical networks, limiting the impact of potential compromise. 6. Consider deploying compensating controls such as hardware security modules or external authentication gateways if supported by the device. 7. Conduct regular security audits and physical inspections of devices to detect signs of tampering. 8. Develop incident response plans specifically addressing physical compromise scenarios for these devices. 9. Educate personnel on the risks of physical access vulnerabilities and enforce strict access policies. 10. If feasible, replace affected devices with versions or models that enforce strong password policies and authentication.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- CyberDanube
- Date Reserved
- 2025-09-03T20:34:19.027Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68d336ad712f26b964ce8e82
Added to database: 9/24/2025, 12:09:17 AM
Last enriched: 3/31/2026, 7:28:39 PM
Last updated: 5/10/2026, 8:42:49 AM
Views: 776
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.