CVE-2025-59109
UART Leaking Sensitive Data in dormakaba registration unit 9002
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
The dormakaba registration units 9002 (PIN Pad Units) have an exposed UART header on the backside. The PIN pad is sending every button press to the UART interface. An attacker can use the interface to exfiltrate PINs. As the devices are explicitly built as Plug-and-Play to be easily replaced, an attacker is easily able to remove the device, install a hardware implant which connects to the UART and exfiltrates the data exposed via UART to another system (e.g. via WiFi).
| CWE | CWE-1295 |
| Vendor | dormakaba |
| Product | dormakaba registration unit 9002 |
| Published | Jan 26, 2026 |
| Last Updated | Mar 3, 2026 |
Stay Ahead of the Next One
Get instant alerts for dormakaba dormakaba registration unit 9002
Be the first to know when new unknown vulnerabilities affecting dormakaba dormakaba registration unit 9002 are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
dormakaba / dormakaba registration unit 9002
<SW0039
References
Credits
Clemens Stockenreitner, SEC Consult Vulnerability Lab Werner Schober, SEC Consult Vulnerability Lab