Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-59107: CWE-798: Use of Hard-coded Credentials in dormakaba Access Manager 92xx-k5

0
High
VulnerabilityCVE-2025-59107cvecve-2025-59107cwe-798
Published: Mon Jan 26 2026 (01/26/2026, 10:06:22 UTC)
Source: CVE Database V5
Vendor/Project: dormakaba
Product: Access Manager 92xx-k5

Description

Dormakaba provides the software FWServiceTool to update the firmware version of the Access Managers via the network. The firmware in some instances is provided in an encrypted ZIP file. Within this tool, the password used to decrypt the ZIP and extract the firmware is set statically and can be extracted. This password was valid for multiple observed firmware versions.

AI-Powered Analysis

AILast updated: 01/26/2026, 10:35:31 UTC

Technical Analysis

The vulnerability identified as CVE-2025-59107 affects dormakaba Access Manager 92xx-k5 devices, specifically the FWServiceTool software used to update device firmware over a network. The firmware updates are delivered as encrypted ZIP files, which require a password to decrypt and extract the firmware. This password is hard-coded statically within the FWServiceTool software and remains valid across multiple firmware versions. Because the password can be extracted from the tool, an attacker with network access can decrypt the firmware packages without authorization. This undermines the confidentiality and integrity of the firmware update process, potentially allowing attackers to analyze, modify, or replace firmware images. The vulnerability does not require any authentication or user interaction, and the attack vector is local network access (AV:L). The CVSS 4.0 base score is 8.5 (high severity), reflecting the ease of exploitation and the high impact on confidentiality and integrity. No patches have been published yet, and no exploits are known in the wild. The root cause is the CWE-798 weakness—use of hard-coded credentials—which is a common but critical security flaw in embedded and IoT devices. Dormakaba Access Managers are widely used in physical access control systems, making this vulnerability particularly concerning for facilities relying on these devices for security.

Potential Impact

For European organizations, the impact of this vulnerability is significant due to the widespread use of dormakaba Access Manager 92xx-k5 devices in physical security infrastructure such as office buildings, data centers, and critical infrastructure sites. Exploitation could allow attackers to decrypt firmware updates, enabling reverse engineering or modification of firmware to implant backdoors or disrupt device operation. This could lead to unauthorized physical access, compromising the security of sensitive facilities. The confidentiality breach of firmware could also facilitate further attacks against the device or network. Given the vulnerability requires only local network access, attackers who gain internal network footholds could leverage this flaw to escalate their attack capabilities. The integrity of the access control system is at risk, potentially leading to operational disruptions or safety hazards. The absence of patches increases the urgency for organizations to implement compensating controls. The threat is particularly relevant for sectors with high physical security requirements, including government, finance, healthcare, and critical infrastructure operators across Europe.

Mitigation Recommendations

1. Immediately restrict network access to the FWServiceTool and dormakaba Access Manager devices by implementing network segmentation and strict firewall rules to limit access only to authorized personnel and systems. 2. Monitor network traffic for unusual or unauthorized attempts to access the firmware update process or FWServiceTool communications. 3. Employ strong internal network security controls, including intrusion detection/prevention systems (IDS/IPS) and network access control (NAC), to detect and block suspicious activity. 4. Coordinate with dormakaba to obtain and apply firmware or software updates as soon as they become available that remove the hard-coded password and implement secure key management practices. 5. Until patches are released, consider out-of-band firmware update methods or manual verification of firmware integrity using cryptographic hashes if supported. 6. Conduct regular security audits of physical access control systems to detect anomalies or signs of tampering. 7. Educate security and IT staff about the vulnerability and the importance of limiting network exposure of access control devices. 8. Implement multi-factor authentication and logging on management interfaces where possible to detect unauthorized access attempts.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
SEC-VLab
Date Reserved
2025-09-09T07:53:12.880Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6977400b4623b1157c815edb

Added to database: 1/26/2026, 10:20:59 AM

Last enriched: 1/26/2026, 10:35:31 AM

Last updated: 1/26/2026, 7:00:17 PM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats