CVE-2025-59095

N/A Unknown

📋 TL;DR

This CVE reveals hard-coded cryptographic secrets in exos 9300 software components, allowing attackers to decrypt sensitive data like user PINs stored in databases. The vulnerability affects systems using the Kaba.EXOS.common.dll library with weak XOR encryption based on a static key derived from a founder's name.

💻 Affected Systems

Products:
  • exos 9300 software components
Versions: All versions using vulnerable Kaba.EXOS.common.dll library
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Specifically affects systems using the EncryptAndDecrypt function in Kaba.EXOS.common.dll for PIN encryption before MSSQL database storage.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of all encrypted user PINs and other sensitive data, potentially leading to unauthorized access to physical security systems, credential theft, and privilege escalation.

🟠

Likely Case

Attackers with database access can decrypt stored PINs and other encrypted data, compromising user authentication and potentially gaining unauthorized system access.

🟢

If Mitigated

With proper network segmentation and database access controls, impact is limited to authorized users who could still decrypt sensitive data if they obtain the static key.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires access to encrypted data and knowledge of the static key. The XOR algorithm is trivial to reverse with the known key.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://www.dormakabagroup.com/en/security-advisories

Restart Required: No

Instructions:

1. Check vendor advisory for updates. 2. Apply any available patches. 3. Replace vulnerable encryption with industry-standard algorithms. 4. Rotate all encrypted credentials.

🔧 Temporary Workarounds

Database Encryption Replacement

windows

Replace the vulnerable encryption with AES-256 or other industry-standard encryption for all sensitive data storage

Credential Rotation

all

Force reset of all user PINs and re-encrypt with secure algorithm

🧯 If You Can't Patch

  • Implement strict database access controls and monitoring
  • Segment network to limit access to systems using vulnerable components

🔍 How to Verify

Check if Vulnerable:

Check if Kaba.EXOS.common.dll exists in system and contains the EncryptAndDecrypt function with hard-coded XOR key

Check Version:

Check DLL version properties or consult vendor documentation

Verify Fix Applied:

Verify encryption algorithm has been replaced with industry-standard implementation and all stored data has been re-encrypted

📡 Detection & Monitoring

Log Indicators:

  • Unusual database access patterns
  • Multiple PIN decryption attempts

Network Indicators:

  • Unexpected MSSQL database queries accessing encrypted PIN fields

SIEM Query:

source="mssql" AND (query="*PIN*" OR query="*EncryptAndDecrypt*")

🔗 References

📤 Share & Export