Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-59097: CWE-306: Missing Authentication for Critical Function in dormakaba Access Manager 92xx-k5

0
Critical
VulnerabilityCVE-2025-59097cvecve-2025-59097cwe-306cwe-1188
Published: Mon Jan 26 2026 (01/26/2026, 10:04:38 UTC)
Source: CVE Database V5
Vendor/Project: dormakaba
Product: Access Manager 92xx-k5

Description

The exos 9300 application can be used to configure Access Managers (e.g. 92xx, 9230 and 9290). The configuration is done in a graphical user interface on the dormakaba exos server. As soon as the save button is clicked in exos 9300, the whole configuration is sent to the selected Access Manager via SOAP. The SOAP request is sent without any prior authentication or authorization by default. Though authentication and authorization can be configured using IPsec for 92xx-K5 devices and mTLS for 92xx-K7 devices, it is not enabled by default and must therefore be activated with additional steps. This insecure default allows an attacker with network level access to completely control the whole environment. An attacker is for example easily able to conduct the following tasks without prior authentication: - Re-configure Access Managers (e.g. remove alarming system requirements) - Freely re-configure the inputs and outputs - Open all connected doors permanently - Open all doors for a defined time interval - Change the admin password - and many more Network level access can be gained due to an insufficient network segmentation as well as missing LAN firewalls. Devices with an insecure configuration have been identified to be directly exposed to the internet.

AI-Powered Analysis

AILast updated: 01/26/2026, 10:38:49 UTC

Technical Analysis

CVE-2025-59097 identifies a critical security flaw in dormakaba Access Manager 92xx-K5 series devices, specifically related to the exos 9300 application used for configuring these devices. The vulnerability arises because the SOAP requests sent from the exos 9300 GUI to the Access Manager devices to save configuration changes do not require any authentication or authorization by default. This missing authentication (CWE-306) allows any attacker with network-level access to send arbitrary configuration commands to the Access Manager. The attacker can perform highly sensitive operations such as reconfiguring inputs and outputs, disabling alarm systems, permanently or temporarily unlocking all connected doors, and changing administrative credentials. Although dormakaba provides options to secure these communications via IPsec for 92xx-K5 devices and mTLS for 92xx-K7 devices, these security features are not enabled by default and require additional manual configuration steps. The vulnerability is exacerbated by common network misconfigurations, including insufficient network segmentation and lack of LAN firewalls, which can expose these devices directly to the internet. The CVSS 4.0 base score of 9.3 reflects the vulnerability's critical impact, with network attack vector, no required privileges or user interaction, and high impact on confidentiality, integrity, and availability. No public exploits have been reported yet, but the ease of exploitation and potential impact make this a severe threat to physical security and IT infrastructure.

Potential Impact

For European organizations, this vulnerability poses a severe risk to physical security and operational continuity. Dormakaba Access Managers are widely used in commercial buildings, government facilities, and critical infrastructure across Europe to control physical access. Exploitation could allow attackers to bypass all physical security controls by unlocking doors, disabling alarms, and altering access policies without detection. This could lead to unauthorized physical intrusions, theft, sabotage, or espionage. The ability to change administrative passwords further increases the risk of persistent unauthorized access. Organizations with poor network segmentation or those exposing these devices to the internet are particularly vulnerable. The impact extends beyond physical security to potential regulatory and compliance violations under GDPR and other European data protection laws if unauthorized access leads to data breaches. Additionally, disruption of access control systems could cause operational downtime and reputational damage.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should immediately verify whether dormakaba Access Manager 92xx-K5 devices are deployed in their environment and assess their network exposure. The following specific actions are recommended: 1) Enable IPsec authentication on all 92xx-K5 devices to enforce authentication and authorization on SOAP configuration requests. 2) If possible, upgrade to or configure devices supporting mTLS for stronger mutual authentication. 3) Implement strict network segmentation to isolate access control devices from general IT networks and untrusted zones. 4) Deploy internal firewalls and access control lists to restrict network-level access to these devices only to authorized management systems. 5) Conduct thorough network scans to identify any devices exposed directly to the internet and immediately remove or secure them. 6) Regularly audit access control configurations and monitor logs for unauthorized changes. 7) Engage with dormakaba support for any available patches or updated firmware addressing this issue. 8) Train security and IT staff on the risks of default insecure configurations and the importance of enabling authentication features. These targeted mitigations go beyond generic advice by focusing on the specific insecure default configuration and network exposure vectors.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
SEC-VLab
Date Reserved
2025-09-09T07:52:56.383Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6977400a4623b1157c815e96

Added to database: 1/26/2026, 10:20:58 AM

Last enriched: 1/26/2026, 10:38:49 AM

Last updated: 2/5/2026, 10:56:09 AM

Views: 69

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats