Authorization Bypass in Daikin Security Gateway
CVE-2025-10127

8.8HIGH

Key Information:

Vendor
CVE Published:
11 September 2025

What is CVE-2025-10127?

CVE-2025-10127 is a critical vulnerability identified in the Daikin Security Gateway, a device designed to manage and secure Daikin's HVAC systems. This vulnerability arises from an authorization bypass caused by a user-controlled key, enabling unauthorized attackers to bypass the necessary authentication mechanisms. By exploiting this flaw, attackers can gain access to the system without needing valid credentials, which poses a significant risk to organizations deploying this technology. This unauthorized access can lead to various malicious activities, including manipulation of HVAC systems, compromising operational integrity, and potential data theft.

Potential impact of CVE-2025-10127

  1. Unauthorized Access: The primary impact of this vulnerability is the ability for attackers to gain unauthorized access to the Daikin Security Gateway. This could potentially allow them to manipulate HVAC operations, posing safety and functionality risks to the physical environments being controlled.

  2. System Compromise: With an attacker able to bypass authentication, there is a risk of full system takeover. This could lead to the installation of malicious software, disruption of services, or use of the compromised systems as a foothold for further intrusions into the organizational network.

  3. Data Breach: Access to the Daikin system could also result in exposure of sensitive organizational data. Attackers may exploit this vulnerability to extract confidential information, which could be used for various malicious purposes, including extortion or further attacks against the organization.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

Security Gateway App: 100, Frm: 214

References

CVSS V4

Score:
8.8
Severity:
HIGH
Confidentiality:
Low
Integrity:
Low
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Gjoko Krstic
.