CVE-2025-25201 (GCVE-0-2025-25201)
Vulnerability from cvelistv5 – Published: 2025-02-12 18:07 – Updated: 2025-02-12 19:28
VLAI?
Title
Improper Validation of Admin Key in PIV Smartcard
Summary
Nitrokey 3 Firmware is the the firmware of Nitrokey 3 USB keys. For release 1.8.0, and test releases with PIV enabled prior to 1.8.0, the PIV application could accept invalid keys for authentication of the admin key. This could lead to compromise of the integrity of the data stored in the application. An attacker without access to the proper administration key would be able to generate new keys and overwrite certificates. Such an attacker would not be able to read-out or extract existing private data, nor would they be able to gain access to cryptographic operations that would normally require PIN-based authentication. The issue is fixed in piv-authenticator 0.3.9, and in Nitrokey's firmware 1.8.1.
Severity ?
4 (Medium)
CWE
- CWE-287 - Improper Authentication
Assigner
References
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Nitrokey | nitrokey-3-firmware |
Affected:
= 1.8.0
|
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-25201",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-02-12T18:33:23.254390Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-02-12T19:28:06.886Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "nitrokey-3-firmware",
"vendor": "Nitrokey",
"versions": [
{
"status": "affected",
"version": "= 1.8.0"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Nitrokey 3 Firmware is the the firmware of Nitrokey 3 USB keys. For release 1.8.0, and test releases with PIV enabled prior to 1.8.0, the PIV application could accept invalid keys for authentication of the admin key. This could lead to compromise of the integrity of the data stored in the application. An attacker without access to the proper administration key would be able to generate new keys and overwrite certificates. Such an attacker would not be able to read-out or extract existing private data, nor would they be able to gain access to cryptographic operations that would normally require PIN-based authentication. The issue is fixed in piv-authenticator 0.3.9, and in Nitrokey\u0027s firmware 1.8.1."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-287",
"description": "CWE-287: Improper Authentication",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-02-12T18:07:13.686Z",
"orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"shortName": "GitHub_M"
},
"references": [
{
"name": "https://github.com/Nitrokey/nitrokey-3-firmware/security/advisories/GHSA-jfhm-ppq8-7hgx",
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://github.com/Nitrokey/nitrokey-3-firmware/security/advisories/GHSA-jfhm-ppq8-7hgx"
},
{
"name": "https://github.com/Nitrokey/nitrokey-3-firmware/releases/tag/v1.8.1",
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/Nitrokey/nitrokey-3-firmware/releases/tag/v1.8.1"
},
{
"name": "https://www.nitrokey.com/blog/2025/nitrokey-3-firmware-v181-security-update",
"tags": [
"x_refsource_MISC"
],
"url": "https://www.nitrokey.com/blog/2025/nitrokey-3-firmware-v181-security-update"
}
],
"source": {
"advisory": "GHSA-jfhm-ppq8-7hgx",
"discovery": "UNKNOWN"
},
"title": "Improper Validation of Admin Key in PIV Smartcard"
}
},
"cveMetadata": {
"assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"assignerShortName": "GitHub_M",
"cveId": "CVE-2025-25201",
"datePublished": "2025-02-12T18:07:13.686Z",
"dateReserved": "2025-02-03T19:30:53.401Z",
"dateUpdated": "2025-02-12T19:28:06.886Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2025-25201\",\"sourceIdentifier\":\"security-advisories@github.com\",\"published\":\"2025-02-12T19:15:21.570\",\"lastModified\":\"2025-02-12T19:15:21.570\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Nitrokey 3 Firmware is the the firmware of Nitrokey 3 USB keys. For release 1.8.0, and test releases with PIV enabled prior to 1.8.0, the PIV application could accept invalid keys for authentication of the admin key. This could lead to compromise of the integrity of the data stored in the application. An attacker without access to the proper administration key would be able to generate new keys and overwrite certificates. Such an attacker would not be able to read-out or extract existing private data, nor would they be able to gain access to cryptographic operations that would normally require PIN-based authentication. The issue is fixed in piv-authenticator 0.3.9, and in Nitrokey\u0027s firmware 1.8.1.\"},{\"lang\":\"es\",\"value\":\"El firmware de Nitrokey 3 es el firmware de las llaves USB de Nitrokey 3. En la versi\u00f3n 1.8.0 y en las versiones de prueba con PIV habilitado antes de la 1.8.0, la aplicaci\u00f3n PIV pod\u00eda aceptar claves no v\u00e1lidas para la autenticaci\u00f3n de la clave de administrador. Esto podr\u00eda poner en riesgo la integridad de los datos almacenados en la aplicaci\u00f3n. Un atacante sin acceso a la clave de administraci\u00f3n adecuada podr\u00eda generar nuevas claves y sobrescribir certificados. Dicho atacante no podr\u00eda leer ni extraer datos privados existentes, ni podr\u00eda obtener acceso a operaciones criptogr\u00e1ficas que normalmente requerir\u00edan autenticaci\u00f3n basada en PIN. El problema se solucion\u00f3 en piv-authenticator 0.3.9 y en el firmware 1.8.1 de Nitrokey.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N\",\"baseScore\":4.0,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.5,\"impactScore\":1.4}]},\"weaknesses\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-287\"}]}],\"references\":[{\"url\":\"https://github.com/Nitrokey/nitrokey-3-firmware/releases/tag/v1.8.1\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/Nitrokey/nitrokey-3-firmware/security/advisories/GHSA-jfhm-ppq8-7hgx\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://www.nitrokey.com/blog/2025/nitrokey-3-firmware-v181-security-update\",\"source\":\"security-advisories@github.com\"}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-25201\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-02-12T18:33:23.254390Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-02-12T19:28:02.522Z\"}}], \"cna\": {\"title\": \"Improper Validation of Admin Key in PIV Smartcard\", \"source\": {\"advisory\": \"GHSA-jfhm-ppq8-7hgx\", \"discovery\": \"UNKNOWN\"}, \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 4, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N\", \"integrityImpact\": \"LOW\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"NONE\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"NONE\"}}], \"affected\": [{\"vendor\": \"Nitrokey\", \"product\": \"nitrokey-3-firmware\", \"versions\": [{\"status\": \"affected\", \"version\": \"= 1.8.0\"}]}], \"references\": [{\"url\": \"https://github.com/Nitrokey/nitrokey-3-firmware/security/advisories/GHSA-jfhm-ppq8-7hgx\", \"name\": \"https://github.com/Nitrokey/nitrokey-3-firmware/security/advisories/GHSA-jfhm-ppq8-7hgx\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"https://github.com/Nitrokey/nitrokey-3-firmware/releases/tag/v1.8.1\", \"name\": \"https://github.com/Nitrokey/nitrokey-3-firmware/releases/tag/v1.8.1\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://www.nitrokey.com/blog/2025/nitrokey-3-firmware-v181-security-update\", \"name\": \"https://www.nitrokey.com/blog/2025/nitrokey-3-firmware-v181-security-update\", \"tags\": [\"x_refsource_MISC\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"Nitrokey 3 Firmware is the the firmware of Nitrokey 3 USB keys. For release 1.8.0, and test releases with PIV enabled prior to 1.8.0, the PIV application could accept invalid keys for authentication of the admin key. This could lead to compromise of the integrity of the data stored in the application. An attacker without access to the proper administration key would be able to generate new keys and overwrite certificates. Such an attacker would not be able to read-out or extract existing private data, nor would they be able to gain access to cryptographic operations that would normally require PIN-based authentication. The issue is fixed in piv-authenticator 0.3.9, and in Nitrokey\u0027s firmware 1.8.1.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-287\", \"description\": \"CWE-287: Improper Authentication\"}]}], \"providerMetadata\": {\"orgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"shortName\": \"GitHub_M\", \"dateUpdated\": \"2025-02-12T18:07:13.686Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2025-25201\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-02-12T19:28:06.886Z\", \"dateReserved\": \"2025-02-03T19:30:53.401Z\", \"assignerOrgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"datePublished\": \"2025-02-12T18:07:13.686Z\", \"assignerShortName\": \"GitHub_M\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…