CVE-2025-59097
Unknown Unknown - Not Provided
Unauthenticated SOAP Access Allows Full Control of dormakaba exos

Publication date: 2026-01-26

Last updated on: 2026-01-26

Assigner: SEC Consult Vulnerability Lab

Description
The exos 9300 application can be used to configure Access Managers (e.g. 92xx, 9230 and 9290). The configuration is done in a graphical user interface on the dormakaba exos server. As soon as the save button is clicked in exos 9300, the whole configuration is sent to the selected Access Manager via SOAP. The SOAP request is sent without any prior authentication or authorization by default. Though authentication and authorization can be configured using IPsec for 92xx-K5 devices and mTLS for 92xx-K7 devices, it is not enabled by default and must therefore be activated with additional steps. This insecure default allows an attacker with network level access to completely control the whole environment. An attacker is for example easily able to conduct the following tasks without prior authentication: - Re-configure Access Managers (e.g. remove alarming system requirements) - Freely re-configure the inputs and outputs - Open all connected doors permanently - Open all doors for a defined time interval - Change the admin password - and many more Network level access can be gained due to an insufficient network segmentation as well as missing LAN firewalls. Devices with an insecure configuration have been identified to be directly exposed to the internet.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-01-26
Last Modified
2026-01-26
Generated
2026-05-07
AI Q&A
2026-01-26
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 8 associated CPEs
Vendor Product Version / Range
dormakaba exos_9300 to BAME_06.00 (exc)
dormakaba access_manager to BAME_06.00 (exc)
dormakaba access_manager to XAMB_04.06.212 (exc)
dormakaba access_manager to BAME_05.02.156 (exc)
dormakaba access_manager to XAMB_04.05.21 (exc)
dormakaba access_manager to BAME_04.05.16 (exc)
dormakaba access_manager to BAME_04.07.268 (exc)
dormakaba access_manager to BAME_05.01.88 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-306 The product does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources.
CWE-1188 The product initializes or sets a resource with a default that is intended to be changed by the product's installer, administrator, or maintainer, but the default is not secure.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability (CVE-2025-59097) affects the dormakaba exos 9300 application used to configure Access Managers via a SOAP interface. By default, the SOAP requests are sent without any authentication or authorization, allowing an attacker with network access to fully control the Access Managers. This includes actions like reconfiguring devices, opening doors permanently or temporarily, changing admin passwords, and disabling security features. Although authentication can be enabled using IPsec or mTLS, it is not enabled by default, making the system insecure if left unconfigured. [1]


How can this vulnerability impact me? :

Exploitation of this vulnerability allows an attacker with network access to gain complete control over the physical access control environment. This means attackers can unlock all connected doors permanently or for specific time intervals, change administrative passwords, disable security alarms, and reconfigure inputs and outputs without any prior authentication. This can lead to unauthorized physical access, security breaches, and potential compromise of the entire facility's access control system. [1]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by identifying Access Manager devices (e.g., 92xx-K5 and 92xx-K7 models) on your network that expose the SOAP interface without authentication or authorization. Network scanning tools can be used to detect devices with open SOAP ports and to analyze SOAP requests sent without authentication. Commands such as 'nmap' can be used to scan for open SOAP service ports on suspected devices. Additionally, monitoring network traffic for unauthenticated SOAP requests to Access Managers can help detect exploitation attempts. Specific commands might include: 1) nmap -p <SOAP port> --script=http-soap-enum <target IP range> 2) tcpdump or Wireshark filters to capture and analyze SOAP traffic to/from Access Managers. However, exact commands are not detailed in the provided resources. [1]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include applying vendor patches as soon as they are available, enabling authentication and authorization mechanisms such as IPsec for 92xx-K5 devices and mTLS for 92xx-K7 devices, which are not enabled by default. Additionally, enforce strong passwords, enable encryption for communication channels, and improve network segmentation to restrict network level access to Access Managers. It is also recommended to deploy LAN firewalls to prevent direct exposure of devices to the internet. [1]


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

This vulnerability allows attackers to gain unauthorized control over physical access infrastructure, including unlocking doors, changing admin passwords, and extracting sensitive data such as card IDs and PIN entries. Such unauthorized access and potential data exposure can lead to violations of compliance requirements under standards like GDPR and HIPAA, which mandate protection of personal and sensitive data as well as secure access controls. The insecure default configuration and exposure to network attacks increase the risk of data breaches and unauthorized physical access, thereby negatively impacting compliance with these regulations. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart