A vulnerability identified as problematic has been detected in Semtech LR1110, LR1120 and LR1121 . The impacted element is an unknown function. This manipulation causes risky cryptographic algorithm. This vulnerability is registered as CVE-2025-14859 . It is feasible to perform the attack on the physical device. No exploit is available.
Full text archived locally
✦ AI Summary· Claude Sonnet
VDB-355946 · CVE-2025-14859 · PSA-2026-001
SEMTECH LR1110/LR1120/LR1121 RISKY ENCRYPTION
HISTORYDIFFRELATEJSONXMLCTI
CVSS Meta Temp Score Current Exploit Price (≈) CTI Interest Score
4.3 $0-$5k 1.62
Summaryinfo
A vulnerability labeled as problematic has been found in Semtech LR1110, LR1120 and LR1121. This affects an unknown function. Such manipulation leads to risky encryption. This vulnerability is documented as CVE-2025-14859. The attack can be executed directly on the physical device. There is not any exploit available.
Detailsinfo
A vulnerability was found in Semtech LR1110, LR1120 and LR1121 (the affected version unknown) and classified as problematic. Affected by this issue is an unknown part. The manipulation with an unknown input leads to a risky encryption vulnerability. Using CWE to declare the problem leads to CWE-327. The product uses a broken or risky cryptographic algorithm or protocol. Impacted is confidentiality, integrity, and availability. CVE summarizes:
The Semtech LR11xx LoRa transceivers implement secure boot functionality using digital signatures to authenticate firmware. However, the implementation uses a non-standard cryptographic hashing algorithm that is vulnerable to second preimage attacks. An attacker with physical access to the device can exploit this weakness to generate a malicious firmware image with a hash collision, bypassing the secure boot verification mechanism and installing arbitrary unauthorized firmware on the device.
The advisory is available at semtech.com. This vulnerability is handled as CVE-2025-14859 since 12/18/2025. The exploitation is known to be easy. Local access is required to approach this attack. No form of authentication is required for exploitation. The technical details are unknown and an exploit is not available. This vulnerability is assigned to T1600 by the MITRE ATT&CK project.
There is no information about possible countermeasures known. It may be suggested to replace the affected object with an alternative product.
Productinfo
Vendor
Semtech
Name
LR1110
LR1120
LR1121
CPE 2.3info
🔒
🔒
🔒
CPE 2.2info
🔒
🔒
🔒
CVSSv4info
VulDB Vector: 🔒
VulDB Reliability: 🔍
CNA CVSS-B Score: 🔒
CNA CVSS-BT Score: 🔒
CNA Vector: 🔒
CVSSv3info
VulDB Meta Base Score: 4.3
VulDB Meta Temp Score: 4.3
VulDB Base Score: 4.3
VulDB Temp Score: 4.3
VulDB Vector: 🔒
VulDB Reliability: 🔍
CVSSv2info
Vector Complexity Authentication Confidentiality Integrity Availability
Unlock Unlock Unlock Unlock Unlock Unlock
Unlock Unlock Unlock Unlock Unlock Unlock
Unlock Unlock Unlock Unlock Unlock Unlock
VulDB Base Score: 🔒
VulDB Temp Score: 🔒
VulDB Reliability: 🔍
Exploitinginfo
Class: Risky encryption
CWE: CWE-327 / CWE-310
CAPEC: 🔒
ATT&CK: 🔒
Physical: Yes
Local: Yes
Remote: No
Availability: 🔒
Status: Not defined
Price Prediction: 🔍
Current Price Estimation: 🔒
0-Day Unlock Unlock Unlock Unlock
Today Unlock Unlock Unlock Unlock
Threat Intelligenceinfo
Interest: 🔍
Active Actors: 🔍
Active APT Groups: 🔍
Countermeasuresinfo
Recommended: no mitigation known
Status: 🔍
0-Day Time: 🔒
Timelineinfo
12/18/2025 CVE reserved
04/07/2026 +109 days Advisory disclosed
04/07/2026 +0 days VulDB entry created
04/07/2026 +0 days VulDB entry last update
Sourcesinfo
Advisory: psa-2026-001
Status: Confirmed
CVE: CVE-2025-14859 (🔒)
GCVE (CVE): GCVE-0-2025-14859
GCVE (VulDB): GCVE-100-355946
Entryinfo
Created: 04/07/2026 23:32
Changes: 04/07/2026 23:32 (68)
Complete: 🔍
Cache ID: 99:30E:101
Discussion
No comments yet. Languages: en.
Please log in to comment.
◂ PreviousOverviewNext ▸