Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-59098: CWE-497: Exposure of Sensitive System Information to an Unauthorized Control Sphere in dormakaba Access Manager 92xx-k5

0
High
VulnerabilityCVE-2025-59098cvecve-2025-59098cwe-497
Published: Mon Jan 26 2026 (01/26/2026, 10:04:51 UTC)
Source: CVE Database V5
Vendor/Project: dormakaba
Product: Access Manager 92xx-k5

Description

The Access Manager is offering a trace functionality to debug errors and issues with the device. The trace functionality is implemented as a simple TCP socket. A tool called TraceClient.exe, provided by dormakaba via the Access Manager web interface, is used to connect to the socket and receive debug information. The data is permanently broadcasted on the TCP socket. The socket can be accessed without any authentication or encryption. The transmitted data is based on the set verbosity level. The verbosity level can be set using the http(s) endpoint with the service interface password or with the guessable identifier of the device via the SOAP interface. The transmitted data contains sensitive data like the Card ID as well as all button presses on Registration units. This allows an attacker with network level access to retrieve all entered PINs on a registration unit.

AI-Powered Analysis

AILast updated: 01/26/2026, 10:37:16 UTC

Technical Analysis

The vulnerability CVE-2025-59098 affects dormakaba Access Manager 92xx-k5 devices, specifically versions prior to XAMB 04.06.212. The Access Manager includes a trace/debug functionality designed to aid in troubleshooting by broadcasting debug information over a TCP socket. This socket is accessible without any authentication or encryption, allowing any network-level attacker to connect and receive the debug data. The data broadcasted depends on a verbosity level that can be set remotely via HTTP(S) endpoints requiring the service interface password or via a SOAP interface using a guessable device identifier, which weakens access control. The debug data includes highly sensitive information such as Card IDs and all button presses on registration units, effectively exposing PIN codes and other authentication inputs. The vulnerability is classified under CWE-497, indicating exposure of sensitive system information to an unauthorized control sphere. The CVSS 4.0 score is 8.7 (high severity), reflecting the ease of exploitation (network access, no authentication), the critical confidentiality impact (exposure of authentication credentials), and the lack of required user interaction or privileges. Although no public exploits are known yet, the vulnerability poses a significant risk to physical security and access control integrity, as attackers could intercept credentials and potentially bypass or manipulate access controls. The lack of encryption and authentication on the debug socket is a fundamental design flaw that enables this exposure.

Potential Impact

For European organizations, this vulnerability could lead to severe security breaches in physical access control systems. Attackers with network access—potentially internal or via compromised network segments—can intercept sensitive authentication data such as Card IDs and PINs, enabling unauthorized physical entry or cloning of access credentials. This undermines the integrity and confidentiality of access control mechanisms, potentially leading to unauthorized facility access, theft, espionage, or sabotage. Organizations in sectors with high physical security requirements—such as government, critical infrastructure, finance, and manufacturing—are particularly at risk. The exposure of PINs and card data also raises compliance concerns under GDPR and other data protection regulations, as biometric and access credentials are sensitive personal data. The vulnerability could facilitate lateral movement within networks if attackers gain physical access, compounding cybersecurity risks. The absence of encryption and authentication on the debug interface increases the attack surface, especially in environments where network segmentation or monitoring is insufficient.

Mitigation Recommendations

Immediate mitigation steps include disabling the trace/debug functionality on affected dormakaba Access Manager devices if possible, or restricting network access to the TCP debug socket through strict firewall rules and network segmentation to limit exposure to trusted administrators only. Organizations should update the Access Manager firmware to versions at or above XAMB 04.06.212 once available, as this likely contains patches addressing the vulnerability. If firmware updates are delayed, implement compensating controls such as VPN tunnels or encrypted management networks to protect debug data in transit. Change and strengthen service interface passwords to prevent unauthorized verbosity level changes. Monitor network traffic for unusual connections to the debug TCP port and audit access logs for suspicious activity. Engage with dormakaba support to obtain official patches or guidance. Additionally, review physical access policies and consider multi-factor authentication methods that do not rely solely on PINs or card data exposed by this vulnerability. Conduct regular security assessments of access control infrastructure to detect and remediate similar weaknesses.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
SEC-VLab
Date Reserved
2025-09-09T07:52:56.383Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6977400a4623b1157c815e9b

Added to database: 1/26/2026, 10:20:58 AM

Last enriched: 1/26/2026, 10:37:16 AM

Last updated: 2/6/2026, 5:11:24 PM

Views: 23

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats