Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-59090: CWE-306: Missing Authentication for Critical Function in dormakaba Kaba exos 9300

0
Critical
VulnerabilityCVE-2025-59090cvecve-2025-59090cwe-306cwe-1188
Published: Mon Jan 26 2026 (01/26/2026, 10:03:21 UTC)
Source: CVE Database V5
Vendor/Project: dormakaba
Product: Kaba exos 9300

Description

On the exos 9300 server, a SOAP API is reachable on port 8002. This API does not require any authentication prior to sending requests. Therefore, network access to the exos server allows e.g. the creation of arbitrary access log events as well as querying the 2FA PINs associated with the enrolled chip cards.

AI-Powered Analysis

AILast updated: 01/26/2026, 10:41:27 UTC

Technical Analysis

The dormakaba Kaba exos 9300 server exposes a SOAP API on TCP port 8002 that does not enforce any authentication, constituting a Missing Authentication for Critical Function vulnerability (CWE-306). This flaw allows any attacker with network access to the device to send arbitrary SOAP requests without credentials. Exploitable functions include the creation of arbitrary access log events, which could be used to manipulate or falsify security logs, and the querying of two-factor authentication (2FA) PINs associated with enrolled chip cards, potentially compromising multi-factor authentication mechanisms. The vulnerability affects all versions prior to 4.4.0, with no official patches currently available, necessitating manual mitigation steps. The CVSS 4.0 score of 9.3 reflects the vulnerability’s critical nature: it requires no privileges, no user interaction, and can be exploited remotely over the network, impacting confidentiality and integrity severely. The exposure of 2FA PINs undermines the security of physical access controls, potentially allowing unauthorized physical entry. The ability to forge access logs further complicates detection and forensic analysis. This vulnerability is classified under CWE-306 (Missing Authentication) and CWE-1188 (Improper Access Control), highlighting fundamental security design flaws in the product’s API. Given dormakaba’s widespread use in European enterprises and critical infrastructure, the risk is substantial. No known exploits are currently reported in the wild, but the ease of exploitation and critical impact warrant urgent attention.

Potential Impact

European organizations using dormakaba Kaba exos 9300 for physical access control face severe risks including unauthorized physical access, compromise of multi-factor authentication credentials, and manipulation of security logs. This can lead to breaches of sensitive facilities, theft of intellectual property, and disruption of critical infrastructure operations. The exposure of 2FA PINs effectively nullifies the protection offered by chip card authentication, increasing the likelihood of insider threats or external attackers gaining unauthorized entry. Log manipulation impairs incident detection and response capabilities, potentially allowing attackers to operate undetected for extended periods. Industries such as finance, government, healthcare, and manufacturing, which rely heavily on secure physical access controls, are particularly vulnerable. The lack of authentication on a critical API also raises concerns about compliance with European data protection and security regulations, potentially leading to legal and reputational consequences. The absence of a patch means organizations must rely on network-level mitigations, which may be incomplete or difficult to enforce in complex environments.

Mitigation Recommendations

Until an official patch is released, organizations should implement strict network segmentation to isolate the Kaba exos 9300 servers from untrusted networks, allowing access only from trusted management hosts. Employ firewall rules to block all inbound traffic to port 8002 except from authorized IP addresses. Monitor network traffic to and from the exos 9300 devices for unusual or unauthorized SOAP requests, using intrusion detection systems with custom signatures if possible. Conduct regular audits of access logs to detect anomalies that may indicate exploitation attempts. Disable or restrict the SOAP API if feasible, or configure the device to limit API exposure. Implement compensating controls such as enhanced physical security measures and additional authentication layers for critical access points. Engage with dormakaba support to obtain guidance on manual mitigation steps and timelines for patch availability. Maintain up-to-date asset inventories to identify all affected devices and prioritize remediation efforts. Finally, educate security teams and physical security personnel about the risks and signs of exploitation related to this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
SEC-VLab
Date Reserved
2025-09-09T07:52:56.382Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6977400a4623b1157c815e73

Added to database: 1/26/2026, 10:20:58 AM

Last enriched: 1/26/2026, 10:41:27 AM

Last updated: 2/6/2026, 5:30:48 PM

Views: 87

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats