CVE-2025-59097: CWE-306: Missing Authentication for Critical Function in dormakaba Access Manager 92xx-k5
The exos 9300 application can be used to configure Access Managers (e.g. 92xx, 9230 and 9290). The configuration is done in a graphical user interface on the dormakaba exos server. As soon as the save button is clicked in exos 9300, the whole configuration is sent to the selected Access Manager via SOAP. The SOAP request is sent without any prior authentication or authorization by default. Though authentication and authorization can be configured using IPsec for 92xx-K5 devices and mTLS for 92xx-K7 devices, it is not enabled by default and must therefore be activated with additional steps. This insecure default allows an attacker with network level access to completely control the whole environment. An attacker is for example easily able to conduct the following tasks without prior authentication: - Re-configure Access Managers (e.g. remove alarming system requirements) - Freely re-configure the inputs and outputs - Open all connected doors permanently - Open all doors for a defined time interval - Change the admin password - and many more Network level access can be gained due to an insufficient network segmentation as well as missing LAN firewalls. Devices with an insecure configuration have been identified to be directly exposed to the internet.
AI Analysis
Technical Summary
CVE-2025-59097 identifies a critical security flaw in dormakaba Access Manager 92xx-K5 series devices, specifically related to the exos 9300 application used for configuring these devices. The vulnerability arises because the SOAP requests sent from the exos 9300 GUI to the Access Manager devices to save configuration changes do not require any authentication or authorization by default. This missing authentication (CWE-306) allows any attacker with network-level access to send arbitrary configuration commands to the Access Manager. The attacker can perform highly sensitive operations such as reconfiguring inputs and outputs, disabling alarm systems, permanently or temporarily unlocking all connected doors, and changing administrative credentials. Although dormakaba provides options to secure these communications via IPsec for 92xx-K5 devices and mTLS for 92xx-K7 devices, these security features are not enabled by default and require additional manual configuration steps. The vulnerability is exacerbated by common network misconfigurations, including insufficient network segmentation and lack of LAN firewalls, which can expose these devices directly to the internet. The CVSS 4.0 base score of 9.3 reflects the vulnerability's critical impact, with network attack vector, no required privileges or user interaction, and high impact on confidentiality, integrity, and availability. No public exploits have been reported yet, but the ease of exploitation and potential impact make this a severe threat to physical security and IT infrastructure.
Potential Impact
For European organizations, this vulnerability poses a severe risk to physical security and operational continuity. Dormakaba Access Managers are widely used in commercial buildings, government facilities, and critical infrastructure across Europe to control physical access. Exploitation could allow attackers to bypass all physical security controls by unlocking doors, disabling alarms, and altering access policies without detection. This could lead to unauthorized physical intrusions, theft, sabotage, or espionage. The ability to change administrative passwords further increases the risk of persistent unauthorized access. Organizations with poor network segmentation or those exposing these devices to the internet are particularly vulnerable. The impact extends beyond physical security to potential regulatory and compliance violations under GDPR and other European data protection laws if unauthorized access leads to data breaches. Additionally, disruption of access control systems could cause operational downtime and reputational damage.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should immediately verify whether dormakaba Access Manager 92xx-K5 devices are deployed in their environment and assess their network exposure. The following specific actions are recommended: 1) Enable IPsec authentication on all 92xx-K5 devices to enforce authentication and authorization on SOAP configuration requests. 2) If possible, upgrade to or configure devices supporting mTLS for stronger mutual authentication. 3) Implement strict network segmentation to isolate access control devices from general IT networks and untrusted zones. 4) Deploy internal firewalls and access control lists to restrict network-level access to these devices only to authorized management systems. 5) Conduct thorough network scans to identify any devices exposed directly to the internet and immediately remove or secure them. 6) Regularly audit access control configurations and monitor logs for unauthorized changes. 7) Engage with dormakaba support for any available patches or updated firmware addressing this issue. 8) Train security and IT staff on the risks of default insecure configurations and the importance of enabling authentication features. These targeted mitigations go beyond generic advice by focusing on the specific insecure default configuration and network exposure vectors.
Affected Countries
Germany, France, United Kingdom, Netherlands, Switzerland, Belgium, Italy, Spain, Austria, Sweden
CVE-2025-59097: CWE-306: Missing Authentication for Critical Function in dormakaba Access Manager 92xx-k5
Description
The exos 9300 application can be used to configure Access Managers (e.g. 92xx, 9230 and 9290). The configuration is done in a graphical user interface on the dormakaba exos server. As soon as the save button is clicked in exos 9300, the whole configuration is sent to the selected Access Manager via SOAP. The SOAP request is sent without any prior authentication or authorization by default. Though authentication and authorization can be configured using IPsec for 92xx-K5 devices and mTLS for 92xx-K7 devices, it is not enabled by default and must therefore be activated with additional steps. This insecure default allows an attacker with network level access to completely control the whole environment. An attacker is for example easily able to conduct the following tasks without prior authentication: - Re-configure Access Managers (e.g. remove alarming system requirements) - Freely re-configure the inputs and outputs - Open all connected doors permanently - Open all doors for a defined time interval - Change the admin password - and many more Network level access can be gained due to an insufficient network segmentation as well as missing LAN firewalls. Devices with an insecure configuration have been identified to be directly exposed to the internet.
AI-Powered Analysis
Technical Analysis
CVE-2025-59097 identifies a critical security flaw in dormakaba Access Manager 92xx-K5 series devices, specifically related to the exos 9300 application used for configuring these devices. The vulnerability arises because the SOAP requests sent from the exos 9300 GUI to the Access Manager devices to save configuration changes do not require any authentication or authorization by default. This missing authentication (CWE-306) allows any attacker with network-level access to send arbitrary configuration commands to the Access Manager. The attacker can perform highly sensitive operations such as reconfiguring inputs and outputs, disabling alarm systems, permanently or temporarily unlocking all connected doors, and changing administrative credentials. Although dormakaba provides options to secure these communications via IPsec for 92xx-K5 devices and mTLS for 92xx-K7 devices, these security features are not enabled by default and require additional manual configuration steps. The vulnerability is exacerbated by common network misconfigurations, including insufficient network segmentation and lack of LAN firewalls, which can expose these devices directly to the internet. The CVSS 4.0 base score of 9.3 reflects the vulnerability's critical impact, with network attack vector, no required privileges or user interaction, and high impact on confidentiality, integrity, and availability. No public exploits have been reported yet, but the ease of exploitation and potential impact make this a severe threat to physical security and IT infrastructure.
Potential Impact
For European organizations, this vulnerability poses a severe risk to physical security and operational continuity. Dormakaba Access Managers are widely used in commercial buildings, government facilities, and critical infrastructure across Europe to control physical access. Exploitation could allow attackers to bypass all physical security controls by unlocking doors, disabling alarms, and altering access policies without detection. This could lead to unauthorized physical intrusions, theft, sabotage, or espionage. The ability to change administrative passwords further increases the risk of persistent unauthorized access. Organizations with poor network segmentation or those exposing these devices to the internet are particularly vulnerable. The impact extends beyond physical security to potential regulatory and compliance violations under GDPR and other European data protection laws if unauthorized access leads to data breaches. Additionally, disruption of access control systems could cause operational downtime and reputational damage.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should immediately verify whether dormakaba Access Manager 92xx-K5 devices are deployed in their environment and assess their network exposure. The following specific actions are recommended: 1) Enable IPsec authentication on all 92xx-K5 devices to enforce authentication and authorization on SOAP configuration requests. 2) If possible, upgrade to or configure devices supporting mTLS for stronger mutual authentication. 3) Implement strict network segmentation to isolate access control devices from general IT networks and untrusted zones. 4) Deploy internal firewalls and access control lists to restrict network-level access to these devices only to authorized management systems. 5) Conduct thorough network scans to identify any devices exposed directly to the internet and immediately remove or secure them. 6) Regularly audit access control configurations and monitor logs for unauthorized changes. 7) Engage with dormakaba support for any available patches or updated firmware addressing this issue. 8) Train security and IT staff on the risks of default insecure configurations and the importance of enabling authentication features. These targeted mitigations go beyond generic advice by focusing on the specific insecure default configuration and network exposure vectors.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- SEC-VLab
- Date Reserved
- 2025-09-09T07:52:56.383Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6977400a4623b1157c815e96
Added to database: 1/26/2026, 10:20:58 AM
Last enriched: 1/26/2026, 10:38:49 AM
Last updated: 2/5/2026, 10:56:09 AM
Views: 69
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1654: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in pkthree Peter’s Date Countdown
MediumCVE-2026-1294: CWE-918 Server-Side Request Forgery (SSRF) in bplugins All In One Image Viewer Block – Gutenberg block to create image viewer with hyperlink
HighCVE-2026-1271: CWE-639 Authorization Bypass Through User-Controlled Key in metagauss ProfileGrid – User Profiles, Groups and Communities
MediumCVE-2025-14079: CWE-862 Missing Authorization in elextensions ELEX WordPress HelpDesk & Customer Ticketing System
MediumCVE-2026-1319: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in themeisle Robin Image Optimizer – Unlimited Image Optimization & WebP Converter
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.