CVE-2025-59090

N/A Unknown

📋 TL;DR

This vulnerability allows unauthenticated attackers to access the SOAP API on exos 9300 servers, enabling them to create arbitrary access log events and query 2FA PINs for enrolled chip cards. It affects organizations using exos 9300 servers with the vulnerable API exposed. The issue stems from missing authentication on the API, making it accessible to anyone with network reachability.

💻 Affected Systems

Products:
  • exos 9300 server
Versions: Specific versions not detailed in CVE; assume all versions with the vulnerable SOAP API configuration.
Operating Systems: Likely proprietary or embedded OS on exos hardware
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability depends on the SOAP API being enabled and reachable on port 8002; default settings may expose it.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could retrieve sensitive 2FA PINs, potentially compromising physical security systems, and manipulate access logs to hide unauthorized activities or create false events.

🟠

Likely Case

Unauthorized users query 2FA PINs or inject fake access events, leading to data exposure and audit trail manipulation without full system compromise.

🟢

If Mitigated

With proper network segmentation and authentication, impact is minimal, limited to isolated incidents if other controls fail.

🌐 Internet-Facing: HIGH, as the API is unauthenticated and exposed on port 8002, allowing direct exploitation from the internet if accessible.
🏢 Internal Only: MEDIUM, as internal attackers could exploit it for privilege escalation or data theft, but requires network access to the server.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation is straightforward due to lack of authentication; attackers can send SOAP requests directly without credentials.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified

Vendor Advisory: https://www.dormakabagroup.com/en/security-advisories

Restart Required: No

Instructions:

Check vendor advisory for updates; if a patch is released, apply it according to vendor instructions, which may involve firmware updates or configuration changes.

🔧 Temporary Workarounds

Block Port 8002

all

Restrict network access to port 8002 using firewalls to prevent unauthorized API requests.

iptables -A INPUT -p tcp --dport 8002 -j DROP
netsh advfirewall firewall add rule name="Block exos API" dir=in action=block protocol=TCP localport=8002

Disable SOAP API

all

If possible, disable the vulnerable SOAP API in the exos server configuration to eliminate the attack surface.

Consult exos server documentation or vendor for specific disable commands; may involve configuration files or admin interfaces.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate exos servers from untrusted networks, limiting access to authorized IPs only.
  • Monitor and log all traffic on port 8002 for suspicious activity, and review access logs regularly for anomalies.

🔍 How to Verify

Check if Vulnerable:

Use a tool like curl or nmap to test if port 8002 is open and responds to SOAP requests without authentication; e.g., 'nmap -p 8002 <server_ip>' or send a SOAP request to check for unauthenticated access.

Check Version:

Check exos server firmware version via admin interface or vendor-specific commands; refer to vendor documentation for exact steps.

Verify Fix Applied:

After applying workarounds, retest port 8002 accessibility; if blocked or API disabled, attempts should fail or be denied.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SOAP API requests on port 8002, especially from unauthorized IPs, or unexpected access log entries being created.

Network Indicators:

  • Traffic to port 8002 from external or suspicious sources, or SOAP requests without prior authentication.

SIEM Query:

Example: 'source_port:8002 AND (event_type:"SOAP" OR protocol:"HTTP") AND NOT src_ip IN [authorized_ips]'

🔗 References

📤 Share & Export