The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2025-14346

CVE-2025-14346: WHILL Wheelchair Auth Bypass Vulnerability

CVE-2025-14346 is an authentication bypass flaw in WHILL Model C2 and Model F wheelchairs that allows attackers to control device movement via Bluetooth. This article covers the technical details, impact, and mitigation.

Updated: January 22, 2026

CVE-2025-14346 Overview

WHILL Model C2 Electric Wheelchairs and Model F Power Chairs do not enforce authentication for Bluetooth connections. An attacker within Bluetooth range can pair with the device and issue movement commands, override speed restrictions, and manipulate configuration profiles without any credentials or user interaction. This vulnerability represents a serious safety concern for users of these mobility devices, as unauthorized control could lead to physical harm.

Critical Impact

Attackers within Bluetooth range can take complete control of affected wheelchairs, potentially causing physical harm to users through unauthorized movement commands and speed manipulation.

Affected Products

  • WHILL Model C2 Electric Wheelchairs
  • WHILL Model F Power Chairs

Discovery Timeline

  • 2026-01-05 - CVE CVE-2025-14346 published to NVD
  • 2026-01-08 - Last updated in NVD database

Technical Details for CVE-2025-14346

Vulnerability Analysis

This vulnerability is classified under CWE-306 (Missing Authentication for Critical Function), which occurs when a system fails to perform authentication for functionality that requires a provable user identity or consumes significant resources. In this case, the WHILL mobility devices accept Bluetooth connections and commands without requiring any form of authentication or pairing authorization.

The affected wheelchairs expose critical mobility control functions over Bluetooth without implementing proper access controls. This design flaw allows any device within Bluetooth range to establish a connection and send commands to the wheelchair's control system. The lack of authentication means there is no mechanism to verify that commands are coming from an authorized source, such as the legitimate user's smartphone application.

Root Cause

The root cause is a fundamental design flaw in the Bluetooth communication protocol implementation. The devices do not implement any authentication mechanism for incoming Bluetooth connections, treating all connection requests as trusted by default. This Missing Authentication for Critical Function (CWE-306) allows unauthenticated actors to access functionality that controls the physical movement of the wheelchair.

Attack Vector

An attacker positioned within Bluetooth range (typically up to 10 meters, potentially extended with directional antennas) can discover the vulnerable wheelchair device, establish an unauthenticated Bluetooth connection, and begin sending control commands. The attack requires no user interaction on the target device and can be performed without any credentials.

The attacker can then:

  • Issue movement commands to control the wheelchair's direction and movement
  • Override safety speed restrictions configured for the user
  • Modify device configuration profiles
  • Potentially disable the legitimate user's control

For detailed technical information about this vulnerability, refer to the CISA Medical Advisory ICSMA-25-364-01.

Detection Methods for CVE-2025-14346

Indicators of Compromise

  • Unexpected or unauthorized Bluetooth connections to the wheelchair device
  • Unexplained movement or behavior of the wheelchair not initiated by the user
  • Changes to speed settings or configuration profiles that were not made by the user
  • Multiple or unknown devices appearing in the wheelchair's Bluetooth pairing history

Detection Strategies

  • Monitor for unusual Bluetooth scanning activity in areas where vulnerable devices are used
  • Implement network monitoring to detect rogue Bluetooth devices attempting connections
  • Review wheelchair device logs (if available) for unauthorized connection attempts
  • Train users to recognize signs of unauthorized device control

Monitoring Recommendations

  • Regularly audit Bluetooth paired devices and remove any unrecognized entries
  • Consider using Bluetooth signal detection tools to identify unauthorized devices in proximity
  • Document normal operational patterns to identify anomalous behavior
  • Establish procedures for users to report unexpected device behavior immediately

How to Mitigate CVE-2025-14346

Immediate Actions Required

  • Contact WHILL for official guidance on firmware updates or patches that address this vulnerability
  • Disable Bluetooth functionality on affected devices when not actively required
  • Limit use of affected devices in public or unsecured areas where attackers could be within range
  • Monitor devices closely for any signs of unauthorized access or control
  • Consider physical supervision when using the device in high-risk environments

Patch Information

Users should consult the CISA Medical Advisory ICSMA-25-364-01 for the latest mitigation guidance and contact WHILL directly for information about firmware updates that address this vulnerability.

Workarounds

  • Disable Bluetooth on the wheelchair when not in active use with an authorized application
  • Use the wheelchair only in controlled environments where unauthorized Bluetooth access is unlikely
  • Maintain physical awareness of surroundings to identify potential attackers with mobile devices in close proximity
  • If possible, configure the device to require manual confirmation for new Bluetooth connections

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeAuth Bypass

  • Vendor/TechWhill

  • SeverityCRITICAL

  • CVSS Score9.3

  • EPSS Probability0.09%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • CWE-306
  • Technical References
  • CISA Medical Advisory ICSMA-25-364-01
  • Latest CVEs
  • CVE-2025-70797: LimeSurvey XSS Vulnerability

  • CVE-2025-30650: Juniper Junos OS Auth Bypass Vulnerability

  • CVE-2026-35471: Goshs Path Traversal Vulnerability

  • CVE-2026-35393: Goshs Path Traversal Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English