EUVD-2025-209287

| CVE-2025-14859 HIGH
2026-04-07 SWI
7.0
CVSS 4.0
Share

CVSS Vector

CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:N/R:I/V:C/RE:M/U:X
Attack Vector
Physical
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
X

Lifecycle Timeline

3
EUVD ID Assigned
Apr 07, 2026 - 20:16 euvd
EUVD-2025-209287
Analysis Generated
Apr 07, 2026 - 20:16 vuln.today
CVE Published
Apr 07, 2026 - 19:58 nvd
HIGH 7.0

Description

The Semtech LR11xx LoRa transceivers implement secure boot functionality using digital signatures to authenticate firmware. However, the implementation uses a non-standard cryptographic hashing algorithm that is vulnerable to second preimage attacks. An attacker with physical access to the device can exploit this weakness to generate a malicious firmware image with a hash collision, bypassing the secure boot verification mechanism and installing arbitrary unauthorized firmware on the device.

Analysis

Cryptographic bypass in Semtech LR11xx LoRa transceiver secure boot allows physically proximate attackers to install arbitrary firmware via hash collision. The implementation uses a non-standard, collision-vulnerable hashing algorithm (CWE-327), enabling second preimage attacks that forge signed firmware images. Affects LR1110, LR1120, and LR1121 transceivers widely deployed in IoT/LoRaWAN devices. CVSS 7.0 requires physical access (AV:P), low complexity, no privileges. No public exploit identified at time of analysis; EPSS data unavailable for this recent CVE.

Technical Context

The LR11xx family (LR1110, LR1120, LR1121) are LoRa transceivers used in IoT sensor nodes, asset trackers, and smart meters requiring long-range wireless connectivity. Secure boot implementations typically use cryptographic signatures (RSA/ECDSA) over standardized hashes (SHA-256/SHA-3) to verify firmware integrity before execution. CWE-327 (Use of a Broken or Risky Cryptographic Algorithm) indicates Semtech implemented a proprietary or deprecated hash function susceptible to second preimage attacks - where an attacker with one valid signed firmware can computationally find a different malicious firmware producing the same hash. Unlike collision attacks (two arbitrary inputs), second preimage attacks directly forge valid signatures for existing legitimate firmware hashes. This fundamentally defeats the secure boot chain-of-trust, as the digital signature verification passes for attacker-controlled code.

Affected Products

Semtech LR1110, LR1120, and LR1121 LoRa transceiver modules are confirmed vulnerable per CPE identifiers cpe:2.3:a:semtech:lr1110, cpe:2.3:a:semtech:lr1120, and cpe:2.3:a:semtech:lr1121, affecting all firmware versions using the flawed secure boot implementation. These transceivers are integrated into third-party IoT devices from manufacturers like RAKwireless, Seeed Studio, and others producing LoRaWAN gateways, trackers, and sensors. Downstream device vendors may issue separate advisories. Semtech's official security bulletin is available at https://www.semtech.com/company/security/security-bulletins/sem-psa-2026-001.

Remediation

Consult Semtech security bulletin SEM-PSA-2026-001 at https://www.semtech.com/company/security/security-bulletins/sem-psa-2026-001 for firmware updates implementing standards-compliant cryptographic hashing (likely SHA-256 or SHA-3). Patch availability and specific fixed firmware versions must be confirmed from the vendor advisory, as silicon-level secure boot fixes may require hardware revision or microcode updates that cannot be field-deployed. If firmware patches are unavailable, implement compensating controls including physical tamper-evident enclosures, restricted device access in secure locations, and runtime integrity monitoring where feasible. For new deployments, evaluate alternative LoRa transceivers with verified secure boot implementations or require vendor attestation of cryptographic algorithm compliance with NIST FIPS 180-4 or equivalent standards. Supply chain security reviews should verify firmware authenticity through independent cryptographic validation before device commissioning.

Priority Score

35
Low Medium High Critical
KEV: 0
EPSS: +0.0
CVSS: +35
POC: 0

Share

EUVD-2025-209287 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy