CVE-2025-25650
Published: 17 March 2025
Summary
CVE-2025-25650 is a critical-severity Insufficiently Protected Credentials (CWE-522) vulnerability in Blackhat (inferred from references). Its CVSS base score is 9.1 (Critical).
Operationally, ranked in the top 48.6% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 IA-5 (Authenticator Management) and SC-28 (Protection of Information at Rest).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly requires cryptographic or other mechanisms to protect NFC card data stored at rest in the digital lock from unauthorized access and extraction for cloning.
Mandates protection of authenticator content, such as NFC card credentials, from unauthorized disclosure and modification to prevent cloning attacks.
Enforces unique identification and authentication of NFC cards as devices, reducing the effectiveness of simple clones through mutual or challenge-response mechanisms.
MITRE ATT&CK Enterprise TechniquesAI
Insufficient information to map techniques.NVD Description
An issue in the storage of NFC card data in Dorset DG 201 Digital Lock H5_433WBSK_v2.2_220605 allows attackers to produce cloned NFC cards to bypass authentication.
Deeper analysisAI
CVE-2025-25650 is a vulnerability in the storage of NFC card data within the Dorset DG 201 Digital Lock running firmware version H5_433WBSK_v2.2_220605. This flaw, linked to CWE-522 (Insufficiently Protected Credentials), enables attackers to produce cloned NFC cards that bypass the device's authentication mechanism. Published on 2025-03-17, it carries a CVSS v3.1 base score of 9.1 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N), indicating critical severity due to high impacts on confidentiality and integrity.
Any remote attacker can exploit this vulnerability with low complexity, no required privileges, and no user interaction. By leveraging the insecure NFC card data storage, attackers can clone legitimate cards to gain unauthorized physical access through the digital lock, potentially compromising secured areas without affecting availability.
Mitigation guidance and further details are available in the primary security assessment report at https://github.com/AbhijithAJ/Dorset_SmartLock_Vulnerability/blob/main/Dorset_Smart_Lock_Security_Assessment_Report.pdf, alongside contextual resources on RFID cloning techniques from a 2013 Black Hat presentation (https://media.blackhat.com/us-13/US-13-Brown-RFID-Hacking-Live-Free-or-RFID-Hard-Slides.pdf) and a Kisi blog post (https://www.getkisi.com/blog/how-to-copy-access-cards-and-keyfobs).
Details
- CWE(s)