CVE-2025-59101: CWE-291: Reliance on IP Address for Authentication in dormakaba Access Manager 92xx-k5
Instead of typical session tokens or cookies, it is verified on a per-request basis if the originating IP address has once successfully logged in. As soon as an authentication request from a certain source IP is successful, the IP address is handled as authenticated. No other session information is stored. Therefore, it is possible to spoof the IP address of a logged-in user to gain access to the Access Manager web interface.
AI Analysis
Technical Summary
CVE-2025-59101 is a vulnerability classified under CWE-291 (Reliance on IP Address for Authentication) found in dormakaba Access Manager 92xx-k5 versions prior to XAMB 04.06.212. The product’s authentication mechanism deviates from standard practices by not using session tokens or cookies to maintain authenticated sessions. Instead, it verifies each request by checking if the originating IP address has previously authenticated successfully. Once an IP address is authenticated, the system treats all subsequent requests from that IP as authenticated, without additional verification. This approach is inherently insecure because IP addresses can be spoofed by attackers, especially in environments where IP spoofing is feasible. An attacker who can spoof the IP address of a legitimate user can bypass authentication controls and gain unauthorized access to the Access Manager web interface. This interface controls access management functions, which are critical for physical and logical security in organizations. The vulnerability has a CVSS 4.0 base score of 7.7 (high severity), reflecting its network attack vector, low attack complexity, no required privileges, partial user interaction, and high impact on confidentiality, integrity, and availability. Although no known exploits are currently reported in the wild, the vulnerability poses a significant risk due to the critical nature of the affected system and the ease of exploitation in certain network environments. The flaw highlights a fundamental design weakness in the authentication mechanism that should be addressed by applying patches or updates once available. Until then, organizations must rely on compensating controls to reduce exposure.
Potential Impact
For European organizations, the impact of this vulnerability can be severe. dormakaba Access Manager is widely used in managing physical access control systems, including doors, gates, and secure areas within corporate, governmental, and critical infrastructure facilities. Unauthorized access to the Access Manager interface could allow attackers to manipulate access permissions, disable security controls, or gain physical entry to restricted areas, leading to potential data breaches, theft, or sabotage. The compromise of such systems can also disrupt business operations and damage organizational reputation. Given the high integration of dormakaba products in sectors like finance, healthcare, transportation, and government across Europe, the risk extends beyond IT systems to physical security domains. The vulnerability’s reliance on IP address authentication means that attackers within the same network segment or with the ability to spoof IP addresses can exploit it, increasing the threat in environments with less stringent network segmentation or monitoring. The lack of session tokens also complicates detection and response, as malicious activity may appear as legitimate traffic from authenticated IPs. Overall, the vulnerability threatens confidentiality, integrity, and availability of access management systems, with cascading effects on organizational security posture.
Mitigation Recommendations
To mitigate CVE-2025-59101, European organizations should take the following specific actions: 1) Immediately identify all instances of dormakaba Access Manager 92xx-k5 in their environment and verify the version to determine exposure. 2) Apply vendor patches or updates as soon as they become available to replace the flawed IP-based authentication mechanism with a secure session management approach. 3) Until patches are deployed, restrict network access to the Access Manager interface using network segmentation, firewall rules, and access control lists to limit connections to trusted hosts and networks. 4) Implement strong network monitoring and anomaly detection to identify suspicious IP spoofing attempts or unusual access patterns. 5) Use VPNs or encrypted tunnels with mutual authentication to access the management interface, reducing the risk of IP spoofing on untrusted networks. 6) Enforce multi-factor authentication (MFA) at the network or application layer if supported, adding an additional layer beyond IP verification. 7) Conduct regular security audits and penetration tests focusing on access management systems to detect weaknesses and validate controls. 8) Educate IT and security teams about the risks of IP-based authentication and the importance of secure session handling. These targeted measures will reduce the attack surface and protect critical access management infrastructure until a permanent fix is applied.
Affected Countries
Germany, Switzerland, France, United Kingdom, Netherlands, Belgium, Austria, Italy, Spain, Sweden
CVE-2025-59101: CWE-291: Reliance on IP Address for Authentication in dormakaba Access Manager 92xx-k5
Description
Instead of typical session tokens or cookies, it is verified on a per-request basis if the originating IP address has once successfully logged in. As soon as an authentication request from a certain source IP is successful, the IP address is handled as authenticated. No other session information is stored. Therefore, it is possible to spoof the IP address of a logged-in user to gain access to the Access Manager web interface.
AI-Powered Analysis
Technical Analysis
CVE-2025-59101 is a vulnerability classified under CWE-291 (Reliance on IP Address for Authentication) found in dormakaba Access Manager 92xx-k5 versions prior to XAMB 04.06.212. The product’s authentication mechanism deviates from standard practices by not using session tokens or cookies to maintain authenticated sessions. Instead, it verifies each request by checking if the originating IP address has previously authenticated successfully. Once an IP address is authenticated, the system treats all subsequent requests from that IP as authenticated, without additional verification. This approach is inherently insecure because IP addresses can be spoofed by attackers, especially in environments where IP spoofing is feasible. An attacker who can spoof the IP address of a legitimate user can bypass authentication controls and gain unauthorized access to the Access Manager web interface. This interface controls access management functions, which are critical for physical and logical security in organizations. The vulnerability has a CVSS 4.0 base score of 7.7 (high severity), reflecting its network attack vector, low attack complexity, no required privileges, partial user interaction, and high impact on confidentiality, integrity, and availability. Although no known exploits are currently reported in the wild, the vulnerability poses a significant risk due to the critical nature of the affected system and the ease of exploitation in certain network environments. The flaw highlights a fundamental design weakness in the authentication mechanism that should be addressed by applying patches or updates once available. Until then, organizations must rely on compensating controls to reduce exposure.
Potential Impact
For European organizations, the impact of this vulnerability can be severe. dormakaba Access Manager is widely used in managing physical access control systems, including doors, gates, and secure areas within corporate, governmental, and critical infrastructure facilities. Unauthorized access to the Access Manager interface could allow attackers to manipulate access permissions, disable security controls, or gain physical entry to restricted areas, leading to potential data breaches, theft, or sabotage. The compromise of such systems can also disrupt business operations and damage organizational reputation. Given the high integration of dormakaba products in sectors like finance, healthcare, transportation, and government across Europe, the risk extends beyond IT systems to physical security domains. The vulnerability’s reliance on IP address authentication means that attackers within the same network segment or with the ability to spoof IP addresses can exploit it, increasing the threat in environments with less stringent network segmentation or monitoring. The lack of session tokens also complicates detection and response, as malicious activity may appear as legitimate traffic from authenticated IPs. Overall, the vulnerability threatens confidentiality, integrity, and availability of access management systems, with cascading effects on organizational security posture.
Mitigation Recommendations
To mitigate CVE-2025-59101, European organizations should take the following specific actions: 1) Immediately identify all instances of dormakaba Access Manager 92xx-k5 in their environment and verify the version to determine exposure. 2) Apply vendor patches or updates as soon as they become available to replace the flawed IP-based authentication mechanism with a secure session management approach. 3) Until patches are deployed, restrict network access to the Access Manager interface using network segmentation, firewall rules, and access control lists to limit connections to trusted hosts and networks. 4) Implement strong network monitoring and anomaly detection to identify suspicious IP spoofing attempts or unusual access patterns. 5) Use VPNs or encrypted tunnels with mutual authentication to access the management interface, reducing the risk of IP spoofing on untrusted networks. 6) Enforce multi-factor authentication (MFA) at the network or application layer if supported, adding an additional layer beyond IP verification. 7) Conduct regular security audits and penetration tests focusing on access management systems to detect weaknesses and validate controls. 8) Educate IT and security teams about the risks of IP-based authentication and the importance of secure session handling. These targeted measures will reduce the attack surface and protect critical access management infrastructure until a permanent fix is applied.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- SEC-VLab
- Date Reserved
- 2025-09-09T07:53:12.879Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6977400b4623b1157c815ebd
Added to database: 1/26/2026, 10:20:59 AM
Last enriched: 1/26/2026, 10:36:45 AM
Last updated: 2/7/2026, 7:57:58 PM
Views: 39
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2109: Improper Authorization in jsbroks COCO Annotator
MediumCVE-2026-2108: Denial of Service in jsbroks COCO Annotator
MediumCVE-2026-2107: Improper Authorization in yeqifu warehouse
MediumCVE-2026-2106: Improper Authorization in yeqifu warehouse
MediumCVE-2026-2105: Improper Authorization in yeqifu warehouse
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.