CVE-2025-59091

N/A Unknown

📋 TL;DR

The Kaba exos 9300 datapoint server contains hardcoded credentials for four users, allowing unauthorized access to door access control systems. Attackers can authenticate to ports 1004/1005 to view door status/alerts and send commands to open arbitrary doors. Organizations using Kaba exos 9300 Access Manager systems are affected.

💻 Affected Systems

Products:
  • Kaba exos 9300 datapoint server
Versions: All versions prior to patched version (specific version unknown from advisory)
Operating Systems: Unknown - likely embedded system
Default Config Vulnerable: ⚠️ Yes
Notes: Affects systems with datapoint server enabled on ports 1004/1005 for Access Manager communication.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain full control of physical access systems, opening all doors, disabling alarms, and potentially allowing unauthorized building entry or theft.

🟠

Likely Case

Unauthorized access to door status monitoring and ability to open specific doors, compromising physical security.

🟢

If Mitigated

Limited to information disclosure of door status if network segmentation prevents command execution.

🌐 Internet-Facing: HIGH - If ports 1004/1005 are exposed to the internet, attackers can remotely exploit without internal access.
🏢 Internal Only: HIGH - Even internally, any network-accessible system can be compromised using the hardcoded credentials.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires network access to ports 1004/1005 and knowledge of hardcoded credentials (which may be publicly available).

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown specific version - check vendor advisory

Vendor Advisory: https://www.dormakabagroup.com/en/security-advisories

Restart Required: Yes

Instructions:

1. Check vendor advisory for patched version. 2. Apply vendor-provided firmware update. 3. Restart exos 9300 system. 4. Verify credentials are no longer hardcoded.

🔧 Temporary Workarounds

Network Segmentation

all

Block external access to ports 1004/1005 and restrict internal access to authorized management systems only.

Firewall Rules

all

Implement strict firewall rules allowing only necessary communication between Access Managers and datapoint server.

🧯 If You Can't Patch

  • Isolate exos 9300 systems on separate VLAN with strict access controls
  • Implement network monitoring for unauthorized access attempts on ports 1004/1005

🔍 How to Verify

Check if Vulnerable:

Attempt authentication to port 1004/1005 using known hardcoded credentials (check security advisories for specifics).

Check Version:

Check system firmware version via management interface (vendor-specific command).

Verify Fix Applied:

After patching, verify authentication attempts with hardcoded credentials fail and only authorized credentials work.

📡 Detection & Monitoring

Log Indicators:

  • Failed authentication attempts from unexpected sources
  • Successful logins using default/hardcoded usernames
  • Door control commands from unauthorized IPs

Network Indicators:

  • Traffic to ports 1004/1005 from unauthorized networks
  • Authentication attempts using hardcoded credentials

SIEM Query:

source_port:1004 OR source_port:1005 AND (event_type:authentication OR event_type:door_control)

🔗 References

📤 Share & Export