The dormakaba registration units 9002 (PIN Pad Units) have an exposed UART header on the backside. The PIN pad is sending every button press to the UART interface. An attacker can use the interface to exfiltrate PINs. As the devices are explicitly built as Plug-and-Play to be easily replaced, an attacker is easily able to remove the device, install a hardware implant which connects to the UART and exfiltrates the data exposed via UART to another system (e.g. via WiFi).
History

Mon, 26 Jan 2026 10:15:00 +0000

Type Values Removed Values Added
Description The dormakaba registration units 9002 (PIN Pad Units) have an exposed UART header on the backside. The PIN pad is sending every button press to the UART interface. An attacker can use the interface to exfiltrate PINs. As the devices are explicitly built as Plug-and-Play to be easily replaced, an attacker is easily able to remove the device, install a hardware implant which connects to the UART and exfiltrates the data exposed via UART to another system (e.g. via WiFi).
Title UART Leaking Sensitive Data in dormakaba registration unit 9002
Weaknesses CWE-1295
References
Metrics cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:A/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: SEC-VLab

Published:

Updated: 2026-01-26T10:06:45.739Z

Reserved: 2025-09-09T07:53:12.880Z

Link: CVE-2025-59109

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-01-26T10:16:08.890

Modified: 2026-01-26T10:16:08.890

Link: CVE-2025-59109

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.