CVE-2025-59098

N/A Unknown

📋 TL;DR

CVE-2025-59098 is an unauthenticated, unencrypted TCP socket vulnerability in dormakaba Access Manager that broadcasts sensitive debug information including card IDs and PIN entries. Attackers with network access can intercept all PINs entered on registration units. This affects organizations using dormakaba Access Manager systems.

💻 Affected Systems

Products:
  • dormakaba Access Manager
Versions: Specific versions not detailed in advisory; check vendor advisory for exact range.
Operating Systems: Windows-based systems running Access Manager
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in default configuration with trace functionality enabled via TCP socket.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of physical access security through PIN harvesting, enabling unauthorized entry to secured facilities.

🟠

Likely Case

Attackers intercepting PINs and card IDs to clone credentials and gain unauthorized physical access.

🟢

If Mitigated

Limited impact if network segmentation prevents access to the vulnerable socket from untrusted networks.

🌐 Internet-Facing: HIGH if the Access Manager is exposed to the internet, as the socket requires no authentication.
🏢 Internal Only: HIGH as any internal attacker or compromised device can access the socket and harvest sensitive data.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires only network access to the TCP socket and use of provided TraceClient.exe or custom TCP client.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisory for specific patched versions.

Vendor Advisory: https://www.dormakabagroup.com/en/security-advisories

Restart Required: Yes

Instructions:

1. Consult dormakaba security advisory. 2. Download and apply the recommended patch/update. 3. Restart the Access Manager service. 4. Verify trace functionality is secured.

🔧 Temporary Workarounds

Disable Trace Socket

all

Disable the trace functionality via Access Manager interface to close the vulnerable TCP socket.

Access via web interface > Configuration > Trace Settings > Disable

Network Segmentation

all

Restrict network access to the Access Manager system using firewall rules.

Configure firewall to block TCP port used by trace socket (check vendor docs for port)

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Access Manager from untrusted networks.
  • Monitor network traffic for connections to the trace socket and investigate anomalies.

🔍 How to Verify

Check if Vulnerable:

Attempt to connect to the trace socket via TCP (e.g., using telnet or netcat) on the Access Manager system; if connection succeeds without authentication, system is vulnerable.

Check Version:

Check Access Manager version via web interface or system documentation.

Verify Fix Applied:

After patching, attempt TCP connection to trace socket; it should be closed or require authentication. Verify trace functionality is disabled or secured in configuration.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected connections to trace socket port in system logs
  • Trace-related error messages indicating access attempts

Network Indicators:

  • TCP connections to the trace socket port from unauthorized IPs
  • Unencrypted traffic containing card IDs or PIN data

SIEM Query:

source="AccessManager" AND (event="TraceSocketConnection" OR port="[trace-port]")

🔗 References

📤 Share & Export