Metrics
Affected Vendors & Products
No advisories yet.
Solution
If the 9002 is installed in an insecure location, it could be manipulated. Hardware access and special equipment is needed to exploit this vulnerability. Also, the manipulated device would need to be reinstalled. To mitigate this vulnerability for 9002 in insecure locations, a newer version of the 9002 (Serial number starts with: 0700039…) could be installed. Important: The version of the installed 9002 can only be checked on-site.
Workaround
No workaround given by the vendor.
Mon, 26 Jan 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The dormakaba registration units 9002 (PIN Pad Units) have an exposed UART header on the backside. The PIN pad is sending every button press to the UART interface. An attacker can use the interface to exfiltrate PINs. As the devices are explicitly built as Plug-and-Play to be easily replaced, an attacker is easily able to remove the device, install a hardware implant which connects to the UART and exfiltrates the data exposed via UART to another system (e.g. via WiFi). | |
| Title | UART Leaking Sensitive Data in dormakaba registration unit 9002 | |
| Weaknesses | CWE-1295 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: SEC-VLab
Published:
Updated: 2026-01-26T10:06:45.739Z
Reserved: 2025-09-09T07:53:12.880Z
Link: CVE-2025-59109
No data.
Status : Awaiting Analysis
Published: 2026-01-26T10:16:08.890
Modified: 2026-01-26T15:03:33.357
Link: CVE-2025-59109
No data.
OpenCVE Enrichment
No data.