CVE-2025-59107: CWE-798: Use of Hard-coded Credentials in dormakaba Access Manager 92xx-k5
Dormakaba provides the software FWServiceTool to update the firmware version of the Access Managers via the network. The firmware in some instances is provided in an encrypted ZIP file. Within this tool, the password used to decrypt the ZIP and extract the firmware is set statically and can be extracted. This password was valid for multiple observed firmware versions.
AI Analysis
Technical Summary
The vulnerability identified as CVE-2025-59107 affects dormakaba Access Manager 92xx-k5 devices, specifically the FWServiceTool software used to update device firmware over a network. The firmware updates are delivered as encrypted ZIP files, which require a password to decrypt and extract the firmware. This password is hard-coded statically within the FWServiceTool software and remains valid across multiple firmware versions. Because the password can be extracted from the tool, an attacker with network access can decrypt the firmware packages without authorization. This undermines the confidentiality and integrity of the firmware update process, potentially allowing attackers to analyze, modify, or replace firmware images. The vulnerability does not require any authentication or user interaction, and the attack vector is local network access (AV:L). The CVSS 4.0 base score is 8.5 (high severity), reflecting the ease of exploitation and the high impact on confidentiality and integrity. No patches have been published yet, and no exploits are known in the wild. The root cause is the CWE-798 weakness—use of hard-coded credentials—which is a common but critical security flaw in embedded and IoT devices. Dormakaba Access Managers are widely used in physical access control systems, making this vulnerability particularly concerning for facilities relying on these devices for security.
Potential Impact
For European organizations, the impact of this vulnerability is significant due to the widespread use of dormakaba Access Manager 92xx-k5 devices in physical security infrastructure such as office buildings, data centers, and critical infrastructure sites. Exploitation could allow attackers to decrypt firmware updates, enabling reverse engineering or modification of firmware to implant backdoors or disrupt device operation. This could lead to unauthorized physical access, compromising the security of sensitive facilities. The confidentiality breach of firmware could also facilitate further attacks against the device or network. Given the vulnerability requires only local network access, attackers who gain internal network footholds could leverage this flaw to escalate their attack capabilities. The integrity of the access control system is at risk, potentially leading to operational disruptions or safety hazards. The absence of patches increases the urgency for organizations to implement compensating controls. The threat is particularly relevant for sectors with high physical security requirements, including government, finance, healthcare, and critical infrastructure operators across Europe.
Mitigation Recommendations
1. Immediately restrict network access to the FWServiceTool and dormakaba Access Manager devices by implementing network segmentation and strict firewall rules to limit access only to authorized personnel and systems. 2. Monitor network traffic for unusual or unauthorized attempts to access the firmware update process or FWServiceTool communications. 3. Employ strong internal network security controls, including intrusion detection/prevention systems (IDS/IPS) and network access control (NAC), to detect and block suspicious activity. 4. Coordinate with dormakaba to obtain and apply firmware or software updates as soon as they become available that remove the hard-coded password and implement secure key management practices. 5. Until patches are released, consider out-of-band firmware update methods or manual verification of firmware integrity using cryptographic hashes if supported. 6. Conduct regular security audits of physical access control systems to detect anomalies or signs of tampering. 7. Educate security and IT staff about the vulnerability and the importance of limiting network exposure of access control devices. 8. Implement multi-factor authentication and logging on management interfaces where possible to detect unauthorized access attempts.
Affected Countries
Germany, France, United Kingdom, Netherlands, Switzerland, Belgium, Italy, Spain, Sweden, Austria
CVE-2025-59107: CWE-798: Use of Hard-coded Credentials in dormakaba Access Manager 92xx-k5
Description
Dormakaba provides the software FWServiceTool to update the firmware version of the Access Managers via the network. The firmware in some instances is provided in an encrypted ZIP file. Within this tool, the password used to decrypt the ZIP and extract the firmware is set statically and can be extracted. This password was valid for multiple observed firmware versions.
AI-Powered Analysis
Technical Analysis
The vulnerability identified as CVE-2025-59107 affects dormakaba Access Manager 92xx-k5 devices, specifically the FWServiceTool software used to update device firmware over a network. The firmware updates are delivered as encrypted ZIP files, which require a password to decrypt and extract the firmware. This password is hard-coded statically within the FWServiceTool software and remains valid across multiple firmware versions. Because the password can be extracted from the tool, an attacker with network access can decrypt the firmware packages without authorization. This undermines the confidentiality and integrity of the firmware update process, potentially allowing attackers to analyze, modify, or replace firmware images. The vulnerability does not require any authentication or user interaction, and the attack vector is local network access (AV:L). The CVSS 4.0 base score is 8.5 (high severity), reflecting the ease of exploitation and the high impact on confidentiality and integrity. No patches have been published yet, and no exploits are known in the wild. The root cause is the CWE-798 weakness—use of hard-coded credentials—which is a common but critical security flaw in embedded and IoT devices. Dormakaba Access Managers are widely used in physical access control systems, making this vulnerability particularly concerning for facilities relying on these devices for security.
Potential Impact
For European organizations, the impact of this vulnerability is significant due to the widespread use of dormakaba Access Manager 92xx-k5 devices in physical security infrastructure such as office buildings, data centers, and critical infrastructure sites. Exploitation could allow attackers to decrypt firmware updates, enabling reverse engineering or modification of firmware to implant backdoors or disrupt device operation. This could lead to unauthorized physical access, compromising the security of sensitive facilities. The confidentiality breach of firmware could also facilitate further attacks against the device or network. Given the vulnerability requires only local network access, attackers who gain internal network footholds could leverage this flaw to escalate their attack capabilities. The integrity of the access control system is at risk, potentially leading to operational disruptions or safety hazards. The absence of patches increases the urgency for organizations to implement compensating controls. The threat is particularly relevant for sectors with high physical security requirements, including government, finance, healthcare, and critical infrastructure operators across Europe.
Mitigation Recommendations
1. Immediately restrict network access to the FWServiceTool and dormakaba Access Manager devices by implementing network segmentation and strict firewall rules to limit access only to authorized personnel and systems. 2. Monitor network traffic for unusual or unauthorized attempts to access the firmware update process or FWServiceTool communications. 3. Employ strong internal network security controls, including intrusion detection/prevention systems (IDS/IPS) and network access control (NAC), to detect and block suspicious activity. 4. Coordinate with dormakaba to obtain and apply firmware or software updates as soon as they become available that remove the hard-coded password and implement secure key management practices. 5. Until patches are released, consider out-of-band firmware update methods or manual verification of firmware integrity using cryptographic hashes if supported. 6. Conduct regular security audits of physical access control systems to detect anomalies or signs of tampering. 7. Educate security and IT staff about the vulnerability and the importance of limiting network exposure of access control devices. 8. Implement multi-factor authentication and logging on management interfaces where possible to detect unauthorized access attempts.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- SEC-VLab
- Date Reserved
- 2025-09-09T07:53:12.880Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6977400b4623b1157c815edb
Added to database: 1/26/2026, 10:20:59 AM
Last enriched: 1/26/2026, 10:35:31 AM
Last updated: 1/26/2026, 7:00:17 PM
Views: 8
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14756: CWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection') in TP-Link Systems Inc. Archer MR600 v5.0
HighCVE-2026-24439: CWE-116 Improper Encoding or Escaping of Output in Shenzhen Tenda Technology Co., Ltd. W30E V2
LowCVE-2026-24435: CWE-942 Permissive Cross-domain Security Policy with Untrusted Domains in Shenzhen Tenda Technology Co., Ltd. W30E V2
HighCVE-2026-24432: CWE-352 Cross-Site Request Forgery (CSRF) in Shenzhen Tenda Technology Co., Ltd. W30E V2
MediumCVE-2026-0925: Improper Validation of Specified Quantity in Input in Tanium Discover
LowActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.