CVE-2025-59092

N/A Unknown

📋 TL;DR

This vulnerability allows unauthenticated attackers to send arbitrary status information to the Kaba exos 9300 access control system via an exposed RPC service. Attackers can manipulate door contact status and other access control data without authentication. Organizations using exos 9300 access control systems are affected.

💻 Affected Systems

Products:
  • Kaba exos 9300 Access Control System
Versions: All versions with the vulnerable RPC service
Operating Systems: Windows (based on .exe process)
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the default configuration where the FSMobilePhoneInterface.exe RPC service is running on port 4000 without authentication requirements.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could manipulate door status information to create false security alerts, override legitimate access control data, or disrupt physical security operations by feeding incorrect status to the access management system.

🟠

Likely Case

Attackers send false door contact status information to create confusion, trigger false alarms, or temporarily disrupt access control monitoring capabilities.

🟢

If Mitigated

With proper network segmentation and access controls, impact is limited to isolated network segments with minimal operational disruption.

🌐 Internet-Facing: HIGH - The service runs on port 4000 and requires no authentication, making internet-exposed systems extremely vulnerable to exploitation.
🏢 Internal Only: MEDIUM - Internal attackers or compromised internal systems could exploit this to manipulate access control data and create security incidents.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires only network access to port 4000 and knowledge of the RPC protocol format. No authentication or special privileges needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified

Vendor Advisory: https://www.dormakabagroup.com/en/security-advisories

Restart Required: No

Instructions:

1. Check vendor advisory for updates. 2. Apply any available patches from Dormakaba. 3. Verify the RPC service now requires authentication.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate exos 9300 systems from untrusted networks using firewalls

# Configure firewall to block port 4000 from untrusted networks
# Example: iptables -A INPUT -p tcp --dport 4000 -j DROP

Service Restriction

windows

Configure the RPC service to only accept connections from trusted IP addresses

# Windows Firewall: New-NetFirewallRule -DisplayName "Block exos RPC" -Direction Inbound -LocalPort 4000 -Protocol TCP -Action Block
# Allow only specific IPs: New-NetFirewallRule -DisplayName "Allow exos RPC" -Direction Inbound -LocalPort 4000 -Protocol TCP -RemoteAddress 192.168.1.0/24 -Action Allow

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate exos 9300 systems from all untrusted networks
  • Deploy intrusion detection systems to monitor for unauthorized access attempts on port 4000

🔍 How to Verify

Check if Vulnerable:

Use nmap or telnet to check if port 4000 is open and accessible without authentication: nmap -p 4000 <target_ip>

Check Version:

Check system documentation or contact vendor for version information

Verify Fix Applied:

Attempt to connect to port 4000 and verify connection is rejected or requires authentication

📡 Detection & Monitoring

Log Indicators:

  • Unexpected connections to port 4000
  • Multiple failed authentication attempts if authentication is implemented
  • Unusual RPC service activity

Network Indicators:

  • Traffic to/from port 4000 from unauthorized sources
  • Unusual RPC protocol patterns
  • High volume of connections to port 4000

SIEM Query:

source_port=4000 OR dest_port=4000 | stats count by src_ip, dest_ip

🔗 References

📤 Share & Export