Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-59093: CWE-656: Reliance on Security Through Obscurity in dormakaba Kaba exos 9300

0
High
VulnerabilityCVE-2025-59093cvecve-2025-59093cwe-656
Published: Mon Jan 26 2026 (01/26/2026, 10:03:54 UTC)
Source: CVE Database V5
Vendor/Project: dormakaba
Product: Kaba exos 9300

Description

Exos 9300 instances are using a randomly generated database password to connect to the configured MSSQL server. The password is derived from static random values, which are concatenated to the hostname and a random string that can be read by every user from the registry. This allows an attacker to derive the database password and get authenticated access to the central exos 9300 database as the user Exos9300Common. The user has the roles ExosDialog and ExosDialogDotNet assigned, which are able to read most tables of the database as well as update and insert into many tables.

AI-Powered Analysis

AILast updated: 01/26/2026, 10:40:21 UTC

Technical Analysis

The vulnerability identified as CVE-2025-59093 affects all versions of dormakaba's Kaba exos 9300 access control system. The core issue stems from the system's reliance on security through obscurity (CWE-656) for database authentication. Specifically, the system generates the MSSQL database password by concatenating static random values with the hostname and a random string stored in the Windows registry. However, the registry key containing this random string is readable by any user on the system, allowing an attacker with local access to reconstruct the database password. Once the password is derived, the attacker can authenticate as the Exos9300Common user, which holds the ExosDialog and ExosDialogDotNet roles. These roles grant broad read access to most database tables and the ability to update or insert data into many tables, effectively allowing an attacker to manipulate access control data, potentially altering permissions, access logs, or system configurations. The vulnerability does not require elevated privileges beyond read access to the registry and does not require user interaction, making it easier to exploit in environments where local access is possible. The CVSS 4.0 vector indicates low attack complexity and no need for user interaction, with high impact on confidentiality, integrity, and availability. No patches are currently available, so manual mitigation is necessary. The vulnerability highlights a fundamental design flaw in credential management, relying on obscurity rather than robust cryptographic protections.

Potential Impact

For European organizations, especially those in sectors relying heavily on physical access control such as government facilities, transportation hubs, healthcare, and critical infrastructure, this vulnerability poses a significant risk. An attacker who gains local access to a system running Kaba exos 9300 can extract the database password and manipulate access control data, potentially granting unauthorized physical access or covering tracks by altering logs. This could lead to unauthorized entry into secure areas, data breaches, or sabotage. The integrity of access control systems is critical for regulatory compliance and safety; thus, exploitation could result in operational disruptions, financial losses, reputational damage, and legal consequences under regulations like GDPR. Since the vulnerability affects all versions and requires manual mitigation, organizations face an urgent need to implement compensating controls. The requirement for local access limits remote exploitation but insider threats or attackers who gain initial footholds could leverage this vulnerability to escalate privileges and move laterally within networks.

Mitigation Recommendations

1. Restrict registry permissions to limit read access only to trusted administrative accounts, preventing unauthorized users from reading the random string used in password derivation. 2. Isolate the MSSQL database server hosting the exos 9300 database on a secured network segment with strict access controls to minimize local access opportunities. 3. Implement robust monitoring and alerting for unusual database activities, such as unexpected read or write operations by the Exos9300Common user. 4. Employ host-based intrusion detection systems (HIDS) to detect unauthorized access attempts to the registry or database files. 5. Conduct regular audits of user permissions and access logs to detect anomalies. 6. Engage with dormakaba for any upcoming patches or official mitigations and plan for timely deployment. 7. Consider deploying application whitelisting and endpoint protection to reduce the risk of attackers gaining local access. 8. Educate staff on the risks of insider threats and enforce strict physical and logical access controls to systems running the vulnerable software. 9. If feasible, redesign or replace the credential management approach to use secure, cryptographically strong methods rather than relying on obscurity.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
SEC-VLab
Date Reserved
2025-09-09T07:52:56.382Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6977400a4623b1157c815e82

Added to database: 1/26/2026, 10:20:58 AM

Last enriched: 1/26/2026, 10:40:21 AM

Last updated: 2/7/2026, 6:16:42 PM

Views: 33

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats