CVE-2025-59102: CWE-312: Cleartext Storage of Sensitive Information in dormakaba Access Manager 92xx-k5
The web server of the Access Manager offers a functionality to download a backup of the local database stored on the device. This database contains the whole configuration. This includes encrypted MIFARE keys, card data, user PINs and much more. The PINs are even stored unencrypted. Combined with the fact that an attacker can easily get access to the backup functionality by abusing the session management issue (CVE-2025-59101), or by exploiting the weak default password (CVE-2025-59108), or by simply setting a new password without prior authentication via the SOAP API (CVE-2025-59097), it is easily possible to access the sensitive data on the device.
AI Analysis
Technical Summary
CVE-2025-59102 is a vulnerability identified in the dormakaba Access Manager 92xx-k5 series, specifically in versions prior to XAMB 04.06.212. The core issue is the cleartext storage of sensitive information within a local database backup that the device’s web server allows users to download. This database contains comprehensive configuration data, including encrypted MIFARE keys, cardholder data, and critically, user PINs stored in plaintext. The vulnerability is exacerbated by the ease with which an attacker can access this backup functionality. Attack vectors include exploiting a session management flaw (CVE-2025-59101), leveraging weak default passwords (CVE-2025-59108), or resetting the device password without authentication via the SOAP API (CVE-2025-59097). These chained vulnerabilities enable attackers to bypass authentication and retrieve the backup containing sensitive data. The CVSS 4.0 vector indicates network attack vector, low attack complexity, no privileges required for the initial exploit (due to chaining), no user interaction, and high impact on confidentiality. The vulnerability does not affect availability or integrity directly but compromises confidentiality severely. No patches are currently linked, and no known exploits are reported in the wild, but the risk remains significant due to the sensitive nature of the data exposed and the ease of access through related vulnerabilities.
Potential Impact
For European organizations, this vulnerability poses a significant risk to physical security and data confidentiality. The exposure of unencrypted PINs and access credentials can lead to unauthorized physical access to secure facilities, potentially compromising sensitive operations and data. Organizations relying on dormakaba Access Manager 92xx-k5 for access control in critical infrastructure sectors such as government, finance, healthcare, and transportation are particularly vulnerable. The compromise of MIFARE keys and card data could facilitate cloning or unauthorized use of access cards, undermining trust in physical security systems. Additionally, the ability to reset passwords without authentication increases the risk of insider threats or external attackers gaining persistent access. The medium CVSS score reflects the moderate complexity but high impact on confidentiality. The lack of known exploits currently provides a window for mitigation, but the chained nature of vulnerabilities means attackers with moderate skills could exploit this threat. This could lead to regulatory compliance issues under GDPR and other data protection laws if sensitive personal data is exposed.
Mitigation Recommendations
1. Immediately restrict access to the web server interface of the Access Manager devices, ideally isolating them on a secure management network. 2. Disable or restrict the backup download functionality until a patch or update is available. 3. Enforce strong, unique passwords on all devices, replacing any default or weak credentials. 4. Monitor and audit access logs for unusual activity, especially attempts to access backup functions or reset passwords via the SOAP API. 5. Implement network-level controls such as IP whitelisting and VPN access for management interfaces. 6. Regularly update and patch the Access Manager firmware as soon as vendor updates become available. 7. Conduct a thorough review of physical access logs and card issuance policies to detect potential misuse. 8. Educate administrators on the risks of the SOAP API and session management flaws and restrict API access to trusted personnel only. 9. Consider deploying additional multi-factor authentication mechanisms for access to management interfaces. 10. Engage with dormakaba support for guidance and to obtain any interim fixes or mitigations.
Affected Countries
Germany, Switzerland, Austria, France, United Kingdom, Netherlands, Belgium, Italy, Spain, Sweden
CVE-2025-59102: CWE-312: Cleartext Storage of Sensitive Information in dormakaba Access Manager 92xx-k5
Description
The web server of the Access Manager offers a functionality to download a backup of the local database stored on the device. This database contains the whole configuration. This includes encrypted MIFARE keys, card data, user PINs and much more. The PINs are even stored unencrypted. Combined with the fact that an attacker can easily get access to the backup functionality by abusing the session management issue (CVE-2025-59101), or by exploiting the weak default password (CVE-2025-59108), or by simply setting a new password without prior authentication via the SOAP API (CVE-2025-59097), it is easily possible to access the sensitive data on the device.
AI-Powered Analysis
Technical Analysis
CVE-2025-59102 is a vulnerability identified in the dormakaba Access Manager 92xx-k5 series, specifically in versions prior to XAMB 04.06.212. The core issue is the cleartext storage of sensitive information within a local database backup that the device’s web server allows users to download. This database contains comprehensive configuration data, including encrypted MIFARE keys, cardholder data, and critically, user PINs stored in plaintext. The vulnerability is exacerbated by the ease with which an attacker can access this backup functionality. Attack vectors include exploiting a session management flaw (CVE-2025-59101), leveraging weak default passwords (CVE-2025-59108), or resetting the device password without authentication via the SOAP API (CVE-2025-59097). These chained vulnerabilities enable attackers to bypass authentication and retrieve the backup containing sensitive data. The CVSS 4.0 vector indicates network attack vector, low attack complexity, no privileges required for the initial exploit (due to chaining), no user interaction, and high impact on confidentiality. The vulnerability does not affect availability or integrity directly but compromises confidentiality severely. No patches are currently linked, and no known exploits are reported in the wild, but the risk remains significant due to the sensitive nature of the data exposed and the ease of access through related vulnerabilities.
Potential Impact
For European organizations, this vulnerability poses a significant risk to physical security and data confidentiality. The exposure of unencrypted PINs and access credentials can lead to unauthorized physical access to secure facilities, potentially compromising sensitive operations and data. Organizations relying on dormakaba Access Manager 92xx-k5 for access control in critical infrastructure sectors such as government, finance, healthcare, and transportation are particularly vulnerable. The compromise of MIFARE keys and card data could facilitate cloning or unauthorized use of access cards, undermining trust in physical security systems. Additionally, the ability to reset passwords without authentication increases the risk of insider threats or external attackers gaining persistent access. The medium CVSS score reflects the moderate complexity but high impact on confidentiality. The lack of known exploits currently provides a window for mitigation, but the chained nature of vulnerabilities means attackers with moderate skills could exploit this threat. This could lead to regulatory compliance issues under GDPR and other data protection laws if sensitive personal data is exposed.
Mitigation Recommendations
1. Immediately restrict access to the web server interface of the Access Manager devices, ideally isolating them on a secure management network. 2. Disable or restrict the backup download functionality until a patch or update is available. 3. Enforce strong, unique passwords on all devices, replacing any default or weak credentials. 4. Monitor and audit access logs for unusual activity, especially attempts to access backup functions or reset passwords via the SOAP API. 5. Implement network-level controls such as IP whitelisting and VPN access for management interfaces. 6. Regularly update and patch the Access Manager firmware as soon as vendor updates become available. 7. Conduct a thorough review of physical access logs and card issuance policies to detect potential misuse. 8. Educate administrators on the risks of the SOAP API and session management flaws and restrict API access to trusted personnel only. 9. Consider deploying additional multi-factor authentication mechanisms for access to management interfaces. 10. Engage with dormakaba support for guidance and to obtain any interim fixes or mitigations.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- SEC-VLab
- Date Reserved
- 2025-09-09T07:53:12.879Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6977400b4623b1157c815ec2
Added to database: 1/26/2026, 10:20:59 AM
Last enriched: 1/26/2026, 10:38:04 AM
Last updated: 2/4/2026, 1:48:29 AM
Views: 26
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1835: Cross-Site Request Forgery in lcg0124 BootDo
MediumCVE-2026-1813: Unrestricted Upload in bolo-blog bolo-solo
MediumCVE-2026-1632: CWE-306 Missing Authentication for Critical Function in RISS SRL MOMA Seismic Station
CriticalCVE-2026-1812: Path Traversal in bolo-blog bolo-solo
MediumCVE-2026-24514: CWE-770 Allocation of Resources Without Limits or Throttling in Kubernetes ingress-nginx
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.