CVE-2025-59094

N/A Unknown

📋 TL;DR

This CVE describes a local privilege escalation vulnerability in the Kaba exos 9300 System management application (d9sysdef.exe). Attackers with local access can schedule arbitrary executables to run with SYSTEM privileges, effectively gaining full system control. This affects organizations using the Kaba exos 9300 access control system management software.

💻 Affected Systems

Products:
  • Kaba exos 9300 System management application
Versions: Specific versions not specified in CVE description
Operating Systems: Windows (implied by .exe executable)
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in d9sysdef.exe component. Requires local access to the system running the management application.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise where attackers gain persistent SYSTEM-level access, install malware, steal credentials, and pivot to other systems in the network.

🟠

Likely Case

Local attackers escalate privileges to SYSTEM, install backdoors, disable security controls, and maintain persistent access to the affected system.

🟢

If Mitigated

Limited impact if proper access controls, least privilege principles, and network segmentation are implemented to restrict local access.

🌐 Internet-Facing: LOW - This is a local privilege escalation requiring local access to the system.
🏢 Internal Only: HIGH - Any malicious insider or compromised account with local access can exploit this to gain SYSTEM privileges.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access but appears straightforward based on description - attackers can specify arbitrary executables to run with SYSTEM privileges.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified in CVE description

Vendor Advisory: https://www.dormakabagroup.com/en/security-advisories

Restart Required: Yes

Instructions:

1. Check vendor advisory for specific patch version. 2. Download patch from official vendor sources. 3. Apply patch following vendor instructions. 4. Restart system as required. 5. Verify patch application.

🔧 Temporary Workarounds

Restrict Local Access

windows

Limit local access to systems running d9sysdef.exe to only authorized administrators

Remove Unnecessary Privileges

windows

Run d9sysdef.exe with least privilege required rather than SYSTEM context if possible

🧯 If You Can't Patch

  • Implement strict access controls to prevent unauthorized local access to affected systems
  • Monitor for suspicious scheduled tasks or processes running with SYSTEM privileges

🔍 How to Verify

Check if Vulnerable:

Check if d9sysdef.exe is present on the system and review its configuration for ability to schedule arbitrary executables with SYSTEM privileges

Check Version:

Check application version through vendor documentation or file properties of d9sysdef.exe

Verify Fix Applied:

Verify patch version against vendor advisory and test that arbitrary executables can no longer be scheduled with SYSTEM privileges

📡 Detection & Monitoring

Log Indicators:

  • Unusual scheduled task creation events
  • Processes running with SYSTEM privileges from unexpected locations
  • Modifications to d9sysdef.exe configuration

Network Indicators:

  • Unusual outbound connections from SYSTEM processes
  • Lateral movement attempts from affected system

SIEM Query:

EventID=4698 OR EventID=4702 (Scheduled Task Created/Updated) AND (ProcessName contains 'd9sysdef' OR TaskName contains suspicious patterns)

🔗 References

📤 Share & Export