CVE-2025-67135
Replay Attack Vulnerability in PGST PG107 Alarm Keyfob
Publication date: 2026-02-11
Last updated on: 2026-02-12
Assigner: MITRE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| pgst | pg107_alarm_system | 1.25.05.hf |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-294 | A capture-replay flaw exists when the design of the product makes it possible for a malicious user to sniff network traffic and bypass authentication by replaying it to the server in question to the same effect as the original message (or with minor changes). |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves weak security in the PF-50 1.2 keyfob used with the PGST PG107 Alarm System version 1.25.05.hf. Attackers can exploit this weakness by performing a code replay attack, which allows them to compromise the access control mechanism of the alarm system.
How can this vulnerability impact me? :
The vulnerability can allow attackers to bypass the access control of the PGST PG107 Alarm System by replaying captured codes from the keyfob. This could lead to unauthorized access to protected premises or systems secured by this alarm system.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
I don't know
What immediate steps should I take to mitigate this vulnerability?
I don't know