CVE-2025-56448
BaseFortify
Publication date: 2025-09-15
Last updated on: 2025-10-14
Assigner: MITRE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| positron | px360bt_firmware | rev8 |
| positron | px360bt | 8200101542 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-294 | A capture-replay flaw exists when the design of the product makes it possible for a malicious user to sniff network traffic and bypass authentication by replaying it to the server in question to the same effect as the original message (or with minor changes). |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Positron PX360BT car alarm system is due to improper implementation of rolling code security. The system fails to rotate or invalidate used RF codes, allowing attackers to capture and replay these signals. This replay attack enables unauthorized disarming of the alarm, unlocking of vehicle doors, and even starting the vehicle remotely without the original remote or physical access. [1]
How can this vulnerability impact me? :
The vulnerability can lead to severe security risks including unauthorized vehicle access, theft, vandalism, and threats to personal safety. Attackers can exploit the flaw using affordable radio tools to bypass the alarm system, compromising the vehicle's security and the user's trust in the alarm's anti-cloning features. [1]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by capturing and analyzing RF signals transmitted during remote lock/unlock operations using affordable Software-Defined Radio (SDR) tools such as Flipper Zero or HackRF. By intercepting these signals, you can check if previously used codes are accepted repeatedly, indicating a failure in rolling code security. Specific commands depend on the SDR tool used; for example, with HackRF you might use commands to capture RF signals in the relevant frequency band and replay them to test if the alarm system accepts reused codes. [1]
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include contacting Positron for a firmware update that revises the rolling code algorithm to ensure proper synchronization and invalidation of used codes. Until an official fix is available, users should be cautious about physical proximity of potential attackers with SDR devices and consider additional physical security measures for their vehicles. Hardware updates to receiver modules are also recommended but require vendor action. [1]