CVE-2025-59096: CWE-798: Use of Hard-coded Credentials in dormakaba Kaba exos 9300
The default password for the extended admin user mode in the application U9ExosAdmin.exe ("Kaba 9300 Administration") is hard-coded in multiple locations as well as documented in the locally stored user documentation.
AI Analysis
Technical Summary
CVE-2025-59096 identifies a vulnerability classified under CWE-798 (Use of Hard-coded Credentials) in the dormakaba Kaba exos 9300 physical access control system. The issue resides in the application U9ExosAdmin.exe, which manages the Kaba 9300 system. The extended admin user mode password is hard-coded in multiple locations within the application binary and is also documented in locally stored user manuals. This design flaw means that anyone with access to the system files or documentation can retrieve the default password and gain elevated administrative privileges. The vulnerability affects all versions of the product, indicating a systemic design oversight without version-specific fixes. The CVSS 4.6 score reflects a medium severity, considering that exploitation requires local access with high privileges but no user interaction or network vector. The vulnerability does not impact confidentiality or availability directly but poses a risk to integrity and administrative control, potentially allowing unauthorized configuration changes or disabling of security controls. No known exploits are currently reported in the wild, and no official patches have been released, so manual mitigation is necessary. This vulnerability is particularly concerning for environments where physical access control systems are critical to security, as it could enable attackers to bypass or manipulate access permissions.
Potential Impact
For European organizations, the impact of CVE-2025-59096 can be significant, especially in sectors relying heavily on physical security controls such as government facilities, transportation hubs, healthcare, and critical infrastructure. Unauthorized administrative access to the Kaba exos 9300 system could allow attackers to alter access permissions, disable alarms, or create backdoors, undermining physical security and potentially enabling further cyber-physical attacks. The confidentiality of access logs and configuration data could be compromised, and the integrity of the access control system could be undermined, leading to unauthorized entry or denial of legitimate access. Although the vulnerability requires local high-privilege access, insider threats or attackers who have already breached perimeter defenses could exploit it to escalate privileges. The lack of patches means organizations must rely on procedural mitigations, increasing operational risk. Given dormakaba's strong presence in Europe, particularly in countries with stringent physical security requirements, the threat could disrupt operations and erode trust in security infrastructure.
Mitigation Recommendations
To mitigate CVE-2025-59096, European organizations should immediately implement the following measures: 1) Change all default and hard-coded passwords in the Kaba exos 9300 system to strong, unique credentials not documented or stored locally. 2) Restrict physical and local administrative access to systems running U9ExosAdmin.exe to trusted personnel only, employing strict access controls and monitoring. 3) Remove or secure local user documentation that contains default credentials to prevent unauthorized discovery. 4) Implement robust logging and alerting on administrative access attempts to detect suspicious activity promptly. 5) Conduct regular audits of access control configurations and user accounts to identify unauthorized changes. 6) Engage with dormakaba support for any available updates or guidance and monitor for future patches. 7) Consider network segmentation and isolation of access control management systems to limit exposure. 8) Train staff on the risks of hard-coded credentials and enforce policies to avoid similar vulnerabilities in custom configurations or integrations. These steps go beyond generic advice by focusing on operational controls and documentation management specific to this vulnerability.
Affected Countries
Germany, Switzerland, Austria, France, United Kingdom, Netherlands, Belgium, Italy, Spain, Sweden
CVE-2025-59096: CWE-798: Use of Hard-coded Credentials in dormakaba Kaba exos 9300
Description
The default password for the extended admin user mode in the application U9ExosAdmin.exe ("Kaba 9300 Administration") is hard-coded in multiple locations as well as documented in the locally stored user documentation.
AI-Powered Analysis
Technical Analysis
CVE-2025-59096 identifies a vulnerability classified under CWE-798 (Use of Hard-coded Credentials) in the dormakaba Kaba exos 9300 physical access control system. The issue resides in the application U9ExosAdmin.exe, which manages the Kaba 9300 system. The extended admin user mode password is hard-coded in multiple locations within the application binary and is also documented in locally stored user manuals. This design flaw means that anyone with access to the system files or documentation can retrieve the default password and gain elevated administrative privileges. The vulnerability affects all versions of the product, indicating a systemic design oversight without version-specific fixes. The CVSS 4.6 score reflects a medium severity, considering that exploitation requires local access with high privileges but no user interaction or network vector. The vulnerability does not impact confidentiality or availability directly but poses a risk to integrity and administrative control, potentially allowing unauthorized configuration changes or disabling of security controls. No known exploits are currently reported in the wild, and no official patches have been released, so manual mitigation is necessary. This vulnerability is particularly concerning for environments where physical access control systems are critical to security, as it could enable attackers to bypass or manipulate access permissions.
Potential Impact
For European organizations, the impact of CVE-2025-59096 can be significant, especially in sectors relying heavily on physical security controls such as government facilities, transportation hubs, healthcare, and critical infrastructure. Unauthorized administrative access to the Kaba exos 9300 system could allow attackers to alter access permissions, disable alarms, or create backdoors, undermining physical security and potentially enabling further cyber-physical attacks. The confidentiality of access logs and configuration data could be compromised, and the integrity of the access control system could be undermined, leading to unauthorized entry or denial of legitimate access. Although the vulnerability requires local high-privilege access, insider threats or attackers who have already breached perimeter defenses could exploit it to escalate privileges. The lack of patches means organizations must rely on procedural mitigations, increasing operational risk. Given dormakaba's strong presence in Europe, particularly in countries with stringent physical security requirements, the threat could disrupt operations and erode trust in security infrastructure.
Mitigation Recommendations
To mitigate CVE-2025-59096, European organizations should immediately implement the following measures: 1) Change all default and hard-coded passwords in the Kaba exos 9300 system to strong, unique credentials not documented or stored locally. 2) Restrict physical and local administrative access to systems running U9ExosAdmin.exe to trusted personnel only, employing strict access controls and monitoring. 3) Remove or secure local user documentation that contains default credentials to prevent unauthorized discovery. 4) Implement robust logging and alerting on administrative access attempts to detect suspicious activity promptly. 5) Conduct regular audits of access control configurations and user accounts to identify unauthorized changes. 6) Engage with dormakaba support for any available updates or guidance and monitor for future patches. 7) Consider network segmentation and isolation of access control management systems to limit exposure. 8) Train staff on the risks of hard-coded credentials and enforce policies to avoid similar vulnerabilities in custom configurations or integrations. These steps go beyond generic advice by focusing on operational controls and documentation management specific to this vulnerability.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- SEC-VLab
- Date Reserved
- 2025-09-09T07:52:56.383Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6977400a4623b1157c815e91
Added to database: 1/26/2026, 10:20:58 AM
Last enriched: 1/26/2026, 10:39:11 AM
Last updated: 2/6/2026, 9:42:14 PM
Views: 56
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25732: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in zauberzeug nicegui
HighCVE-2026-25574: CWE-639: Authorization Bypass Through User-Controlled Key in payloadcms payload
MediumCVE-2026-25544: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in payloadcms payload
CriticalCVE-2026-25516: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in zauberzeug nicegui
MediumCVE-2026-2067: Buffer Overflow in UTT 进取 520W
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.