The dormakaba registration units 9002 (PIN Pad Units) have an exposed UART header on the backside. The PIN pad is sending every button press to the UART interface. An attacker can use the interface to exfiltrate PINs. As the devices are explicitly built as Plug-and-Play to be easily replaced, an attacker is easily able to remove the device, install a hardware implant which connects to the UART and exfiltrates the data exposed via UART to another system (e.g. via WiFi).
Metrics
Affected Vendors & Products
References
History
Tue, 27 Jan 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Dormakaba
Dormakaba registration Unit 9002 |
|
| Vendors & Products |
Dormakaba
Dormakaba registration Unit 9002 |
Tue, 27 Jan 2026 07:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Mon, 26 Jan 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The dormakaba registration units 9002 (PIN Pad Units) have an exposed UART header on the backside. The PIN pad is sending every button press to the UART interface. An attacker can use the interface to exfiltrate PINs. As the devices are explicitly built as Plug-and-Play to be easily replaced, an attacker is easily able to remove the device, install a hardware implant which connects to the UART and exfiltrates the data exposed via UART to another system (e.g. via WiFi). | |
| Title | UART Leaking Sensitive Data in dormakaba registration unit 9002 | |
| Weaknesses | CWE-1295 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: SEC-VLab
Published:
Updated: 2026-01-27T06:06:05.350Z
Reserved: 2025-09-09T07:53:12.880Z
Link: CVE-2025-59109
No data.
Status : Awaiting Analysis
Published: 2026-01-26T10:16:08.890
Modified: 2026-01-27T07:16:06.670
Link: CVE-2025-59109
No data.