Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-9965: CWE-287 Improper Authentication in Novakon P series (P07, P10, P12, P15)

0
Critical
VulnerabilityCVE-2025-9965cvecve-2025-9965cwe-287
Published: Tue Sep 23 2025 (09/23/2025, 11:36:35 UTC)
Source: CVE Database V5
Vendor/Project: Novakon
Product: P series (P07, P10, P12, P15)

Description

Improper authentication vulnerability in Novakon P series allows unauthenticated attackers to upload and download any application from/to the device.This issue affects P series: P – V2001.A.C518o2 until P-2.0.05 Build 2026.02.06 (commit d0f97fd9).

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/31/2026, 19:28:58 UTC

Technical Analysis

CVE-2025-9965 is an improper authentication vulnerability (CWE-287) identified in the Novakon P series programmable logic controllers (PLCs), specifically models P07, P10, P12, and P15. The affected firmware versions range from P – V2001.A.C518o2 through P-2.0.05 Build 2026.02.06. The vulnerability allows unauthenticated remote attackers to upload and download any application code to or from the device without requiring any credentials or user interaction. This means attackers can potentially replace legitimate control logic with malicious code or extract sensitive application data, compromising the device’s integrity and confidentiality. The CVSS 4.0 base score is 9.3 (critical), reflecting the ease of exploitation (network attack vector, no privileges or user interaction needed), and the high impact on confidentiality, integrity, and availability. The vulnerability has a low scope change but high impact severity on the device’s operation. No patches or exploits in the wild are currently reported, but the risk is significant given the critical role of these devices in industrial control systems. The vulnerability stems from improper authentication mechanisms that fail to restrict access to application upload/download functionality, a fundamental security flaw in industrial device firmware. This flaw could be leveraged to disrupt industrial processes, cause physical damage, or exfiltrate sensitive operational data.

Potential Impact

The impact of CVE-2025-9965 is severe for organizations using Novakon P series PLCs in industrial automation, manufacturing, and critical infrastructure sectors. Successful exploitation allows attackers to fully control the device’s application logic, enabling sabotage of industrial processes, disruption of production lines, or physical damage to equipment. Confidentiality is compromised as attackers can download proprietary or sensitive application data. Integrity is critically affected since malicious applications can be uploaded, altering device behavior. Availability is also at risk due to potential device malfunctions or shutdowns caused by unauthorized code. The lack of authentication means attackers can exploit this vulnerability remotely without prior access, increasing the attack surface. This could lead to operational downtime, financial losses, safety hazards, and reputational damage. Given the strategic importance of industrial control systems globally, this vulnerability poses a significant threat to sectors such as energy, manufacturing, transportation, and utilities.

Mitigation Recommendations

1. Immediate mitigation should include network segmentation to isolate Novakon P series devices from untrusted networks and restrict access to management interfaces. 2. Implement strict firewall rules and access control lists (ACLs) to limit communication to authorized personnel and systems only. 3. Monitor network traffic for unusual upload/download activity targeting these devices. 4. Disable any unnecessary remote management features until patches are available. 5. Regularly audit device firmware versions and configurations to identify vulnerable units. 6. Engage with Novakon for official patches or firmware updates addressing this vulnerability and apply them promptly once released. 7. Employ intrusion detection/prevention systems (IDS/IPS) tailored for industrial protocols to detect exploitation attempts. 8. Train operational technology (OT) staff to recognize signs of compromise and enforce strong physical security controls to prevent unauthorized local access. 9. Develop and test incident response plans specific to industrial control system breaches involving these devices. 10. Consider deploying application whitelisting or code signing mechanisms if supported by the devices to prevent unauthorized application uploads.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
CyberDanube
Date Reserved
2025-09-03T20:34:19.829Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68d336ad712f26b964ce8ed1

Added to database: 9/24/2025, 12:09:17 AM

Last enriched: 3/31/2026, 7:28:58 PM

Last updated: 5/10/2026, 8:28:37 AM

Views: 374

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses