Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-59103: CWE-1391: Use of Weak Credentials in dormakaba Access Manager 92xx-k5

0
Critical
VulnerabilityCVE-2025-59103cvecve-2025-59103cwe-1391
Published: Mon Jan 26 2026 (01/26/2026, 10:05:45 UTC)
Source: CVE Database V5
Vendor/Project: dormakaba
Product: Access Manager 92xx-k5

Description

The Access Manager 92xx in hardware revision K7 is based on Linux instead of Windows CE embedded in older hardware revisions. In this new hardware revision it was noticed that an SSH service is exposed on port 22. By analyzing the firmware of the devices, it was noticed that there are two users with hardcoded and weak passwords that can be used to access the devices via SSH. The passwords can be also guessed very easily. The password of at least one user is set to a random value after the first deployment, with the restriction that the password is only randomized if the configured date is prior to 2022. Therefore, under certain circumstances, the passwords are not randomized. For example, if the clock is never set on the device, the battery of the clock module has been changed, the Access Manager has been factory reset and has not received a time yet.

AI-Powered Analysis

AILast updated: 01/26/2026, 10:36:24 UTC

Technical Analysis

The dormakaba Access Manager 92xx-k5 hardware revision K7 introduces a significant security vulnerability identified as CVE-2025-59103. Unlike previous versions based on Windows CE, this revision runs Linux and exposes an SSH service on port 22. Analysis of the firmware reveals two user accounts with hardcoded, weak passwords that can be easily guessed, allowing unauthorized SSH access. One user’s password is intended to be randomized after initial deployment only if the device’s internal clock is set to a date prior to 2022. However, if the device clock is never set, reset due to battery replacement, or after a factory reset without receiving a valid time, the password remains in a default or predictable state. This design flaw creates a persistent attack vector where attackers can remotely access the device without authentication or user interaction. The vulnerability impacts confidentiality by exposing device credentials, integrity by allowing unauthorized configuration changes, and availability by potentially disrupting access control functions. The CVSS 4.0 score of 9.2 (critical) reflects the vulnerability’s ease of exploitation (network attack vector, no privileges or user interaction required) and its severe impact on all security properties. Although no exploits have been reported in the wild, the risk is high due to the device’s role in physical security and network infrastructure. The affected versions are specifically 92xx-K5 devices running firmware versions below BAME 05.01.88. The lack of patch links indicates that fixes may not yet be publicly available, emphasizing the need for proactive mitigation.

Potential Impact

For European organizations, this vulnerability poses a critical risk to physical and network security. dormakaba Access Manager devices are widely used in Europe for controlling building access in corporate offices, government facilities, healthcare, and critical infrastructure sectors. Exploitation could allow attackers to bypass physical security controls by remotely accessing and manipulating door access systems, potentially enabling unauthorized entry. Furthermore, compromised devices could serve as footholds for lateral movement within enterprise networks, risking broader IT infrastructure compromise. The impact is especially severe for organizations with high security requirements, such as financial institutions, government agencies, and critical infrastructure operators. Disruption or manipulation of access control systems can lead to operational downtime, data breaches, and safety hazards. The vulnerability’s reliance on device clock settings means that devices in environments with poor time synchronization or maintenance practices are particularly vulnerable. Given the criticality of access control in security postures, the threat could have cascading effects on organizational security and compliance with European data protection and safety regulations.

Mitigation Recommendations

Organizations should immediately inventory all dormakaba Access Manager 92xx-k5 devices and verify their hardware revision and firmware versions. Until patches are available, implement strict network segmentation to isolate these devices from general IT networks and restrict SSH access to trusted management hosts only. Manually verify and set the device internal clock to a date prior to 2022 to trigger password randomization where applicable, or reset passwords manually if supported by the device management interface. Monitor network traffic for unauthorized SSH connection attempts to these devices. Engage dormakaba support to obtain firmware updates or security advisories and apply patches promptly once released. Consider deploying compensating controls such as multi-factor authentication for device management interfaces and enhanced physical security monitoring. Regularly audit device configurations and access logs to detect suspicious activity. Finally, establish procedures to ensure device clocks remain synchronized and protected against resets that could revert passwords to weak defaults.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
SEC-VLab
Date Reserved
2025-09-09T07:53:12.879Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6977400b4623b1157c815ec7

Added to database: 1/26/2026, 10:20:59 AM

Last enriched: 1/26/2026, 10:36:24 AM

Last updated: 2/7/2026, 6:37:18 PM

Views: 94

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats