Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-59095: CWE-798: Use of Hard-coded Credentials in dormakaba Kaba exos 9300

0
Medium
VulnerabilityCVE-2025-59095cvecve-2025-59095cwe-798
Published: Mon Jan 26 2026 (01/26/2026, 10:04:15 UTC)
Source: CVE Database V5
Vendor/Project: dormakaba
Product: Kaba exos 9300

Description

The program libraries (DLL) and binaries used by exos 9300 contain multiple hard-coded secrets. One notable example is the function "EncryptAndDecrypt" in the library Kaba.EXOS.common.dll. This algorithm uses a simple XOR encryption technique combined with a cryptographic key (cryptoKey) to transform each character of the input string. However, it's important to note that this implementation does not provide strong encryption and should not be considered secure for sensitive data. It's more of a custom encryption approach rather than a common algorithm used in cryptographic applications. The key itself is static and based on the founder's name of the company. The functionality is for example used to encrypt the user PINs before storing them in the MSSQL database.

AI-Powered Analysis

AILast updated: 01/26/2026, 10:39:35 UTC

Technical Analysis

CVE-2025-59095 identifies a vulnerability in dormakaba's Kaba exos 9300 physical access control system software versions prior to 4.3.3. The issue stems from the presence of hard-coded secrets within the program libraries and binaries, notably in the Kaba.EXOS.common.dll library. The function "EncryptAndDecrypt" employs a simplistic XOR-based encryption algorithm combined with a static cryptographic key derived from the company founder's name. This key is embedded directly in the code and used to encrypt user PINs before storing them in an MSSQL database. XOR encryption with a static key is cryptographically weak and easily reversible once the key is known or extracted from the binary. Because the key is hard-coded and unchanging, an attacker with access to the system files or memory can decrypt stored PINs, leading to exposure of sensitive authentication data. The vulnerability requires local access with low privileges but no user interaction or elevated privileges. The CVSS 4.0 score of 6.8 reflects the moderate risk due to limited attack vector (local) but high impact on confidentiality. There are no known exploits in the wild, and no patches have been linked yet, though upgrading to version 4.3.3 or later is recommended. This vulnerability falls under CWE-798 (Use of Hard-coded Credentials), a common weakness that undermines cryptographic protections and can lead to credential compromise. Given the role of Kaba exos 9300 in physical access control, exploitation could allow unauthorized physical access if PINs are recovered and reused.

Potential Impact

For European organizations, especially those relying on dormakaba's Kaba exos 9300 for physical access control, this vulnerability poses a significant confidentiality risk. Exposure of user PINs could enable attackers to bypass physical security controls, potentially gaining unauthorized entry to sensitive facilities, data centers, or critical infrastructure sites. This could lead to theft, sabotage, or espionage. The impact is heightened in sectors such as government, finance, healthcare, and industrial manufacturing, where physical security is tightly integrated with cybersecurity. Although the vulnerability does not directly affect system integrity or availability, the compromise of authentication credentials undermines trust in the access control system. The requirement for local access limits remote exploitation but insider threats or attackers who gain initial footholds could leverage this weakness. Additionally, the static nature of the key means that once compromised, all stored PINs encrypted with it are vulnerable, increasing the scope of impact. Organizations may face regulatory and compliance consequences under GDPR if personal data is exposed due to inadequate protection mechanisms.

Mitigation Recommendations

To mitigate CVE-2025-59095, organizations should immediately upgrade all affected Kaba exos 9300 systems to version 4.3.3 or later, where the hard-coded key issue is addressed. Until patches are applied, restrict local access to systems running the vulnerable software by enforcing strict physical and logical access controls and monitoring for unauthorized access attempts. Conduct thorough audits of existing user PIN storage and consider resetting PINs after patching to invalidate any potentially compromised credentials. Implement network segmentation to isolate access control systems from general IT infrastructure, reducing attack surface. Employ endpoint detection and response (EDR) tools to detect suspicious activity indicative of attempts to extract or reverse engineer binaries. Educate staff about insider threat risks and enforce least privilege principles to minimize opportunities for exploitation. Finally, engage with dormakaba support for guidance on secure configuration and future updates.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
SEC-VLab
Date Reserved
2025-09-09T07:52:56.383Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6977400a4623b1157c815e8c

Added to database: 1/26/2026, 10:20:58 AM

Last enriched: 1/26/2026, 10:39:35 AM

Last updated: 2/7/2026, 8:01:22 AM

Views: 40

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats