CVE-2025-56448
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-09-15

Last updated on: 2025-10-14

Assigner: MITRE

Description
The Positron PX360BT SW REV 8 car alarm system is vulnerable to a replay attack due to a failure in implementing rolling code security. The alarm system does not properly rotate or invalidate used codes, allowing repeated reuse of captured transmissions. This exposes users to significant security risks, including vehicle theft and loss of trust in the alarm's anti-cloning claims.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-09-15
Last Modified
2025-10-14
Generated
2026-05-07
AI Q&A
2025-09-15
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
positron px360bt_firmware rev8
positron px360bt 8200101542
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-294 A capture-replay flaw exists when the design of the product makes it possible for a malicious user to sniff network traffic and bypass authentication by replaying it to the server in question to the same effect as the original message (or with minor changes).
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability in the Positron PX360BT car alarm system is due to improper implementation of rolling code security. The system fails to rotate or invalidate used RF codes, allowing attackers to capture and replay these signals. This replay attack enables unauthorized disarming of the alarm, unlocking of vehicle doors, and even starting the vehicle remotely without the original remote or physical access. [1]


How can this vulnerability impact me? :

The vulnerability can lead to severe security risks including unauthorized vehicle access, theft, vandalism, and threats to personal safety. Attackers can exploit the flaw using affordable radio tools to bypass the alarm system, compromising the vehicle's security and the user's trust in the alarm's anti-cloning features. [1]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by capturing and analyzing RF signals transmitted during remote lock/unlock operations using affordable Software-Defined Radio (SDR) tools such as Flipper Zero or HackRF. By intercepting these signals, you can check if previously used codes are accepted repeatedly, indicating a failure in rolling code security. Specific commands depend on the SDR tool used; for example, with HackRF you might use commands to capture RF signals in the relevant frequency band and replay them to test if the alarm system accepts reused codes. [1]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include contacting Positron for a firmware update that revises the rolling code algorithm to ensure proper synchronization and invalidation of used codes. Until an official fix is available, users should be cautious about physical proximity of potential attackers with SDR devices and consider additional physical security measures for their vehicles. Hardware updates to receiver modules are also recommended but require vendor action. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart