Cyber Posture

CVE-2025-25650

Critical

Published: 17 March 2025

Published
17 March 2025
Modified
15 April 2026
KEV Added
Patch
CVSS Score 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
EPSS Score 0.0028 51.4th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-25650 is a critical-severity Insufficiently Protected Credentials (CWE-522) vulnerability in Blackhat (inferred from references). Its CVSS base score is 9.1 (Critical).

Operationally, ranked in the top 48.6% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 IA-5 (Authenticator Management) and SC-28 (Protection of Information at Rest).

Threat & Defense at a Glance

What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly requires cryptographic or other mechanisms to protect NFC card data stored at rest in the digital lock from unauthorized access and extraction for cloning.

prevent

Mandates protection of authenticator content, such as NFC card credentials, from unauthorized disclosure and modification to prevent cloning attacks.

prevent

Enforces unique identification and authentication of NFC cards as devices, reducing the effectiveness of simple clones through mutual or challenge-response mechanisms.

MITRE ATT&CK Enterprise TechniquesAI

Insufficient information to map techniques.
Confidence: LOW · MITRE ATT&CK Enterprise v19.0

NVD Description

An issue in the storage of NFC card data in Dorset DG 201 Digital Lock H5_433WBSK_v2.2_220605 allows attackers to produce cloned NFC cards to bypass authentication.

Deeper analysisAI

CVE-2025-25650 is a vulnerability in the storage of NFC card data within the Dorset DG 201 Digital Lock running firmware version H5_433WBSK_v2.2_220605. This flaw, linked to CWE-522 (Insufficiently Protected Credentials), enables attackers to produce cloned NFC cards that bypass the device's authentication mechanism. Published on 2025-03-17, it carries a CVSS v3.1 base score of 9.1 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N), indicating critical severity due to high impacts on confidentiality and integrity.

Any remote attacker can exploit this vulnerability with low complexity, no required privileges, and no user interaction. By leveraging the insecure NFC card data storage, attackers can clone legitimate cards to gain unauthorized physical access through the digital lock, potentially compromising secured areas without affecting availability.

Mitigation guidance and further details are available in the primary security assessment report at https://github.com/AbhijithAJ/Dorset_SmartLock_Vulnerability/blob/main/Dorset_Smart_Lock_Security_Assessment_Report.pdf, alongside contextual resources on RFID cloning techniques from a 2013 Black Hat presentation (https://media.blackhat.com/us-13/US-13-Brown-RFID-Hacking-Live-Free-or-RFID-Hard-Slides.pdf) and a Kisi blog post (https://www.getkisi.com/blog/how-to-copy-access-cards-and-keyfobs).

Details

CWE(s)

Affected Products

Blackhat
inferred from references and description; NVD did not file a CPE for this CVE

CVEs Like This One

CVE-2025-69271Shared CWE-522
CVE-2026-23658Shared CWE-522
CVE-2025-27650Shared CWE-522
CVE-2025-54863Shared CWE-522
CVE-2025-26492Shared CWE-522
CVE-2026-21670Shared CWE-522
CVE-2025-36568Shared CWE-522
CVE-2025-58130Shared CWE-522
CVE-2026-35467Shared CWE-522
CVE-2026-20791Shared CWE-522

References