CVE-2025-59099

N/A Unknown

📋 TL;DR

This path traversal vulnerability in CompactWebServer allows unauthenticated attackers to read arbitrary files on the file system, including sensitive SQLite databases containing badge information and PIN codes. It also enables denial of service attacks by crashing the web server. Systems using Access Manager with the vulnerable CompactWebServer component are affected.

💻 Affected Systems

Products:
  • Access Manager using CompactWebServer
Versions: All versions using vulnerable CompactWebServer component
Operating Systems: Windows, Linux (if running C#/.NET)
Default Config Vulnerable: ⚠️ Yes
Notes: Specifically affects the CompactWebServer component within Access Manager deployments.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise through credential theft, physical security bypass using stolen badge/PIN data, and sustained denial of service making the system unavailable.

🟠

Likely Case

Unauthenticated data exfiltration of sensitive files and intermittent service disruption through targeted DoS attacks.

🟢

If Mitigated

Limited impact if proper network segmentation and file system permissions prevent access to critical files.

🌐 Internet-Facing: HIGH - Directly exploitable via simple HTTP requests without authentication.
🏢 Internal Only: HIGH - Even internally, the vulnerability requires no authentication and provides full file system access.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Simple path traversal via GET requests makes exploitation trivial. No authentication required.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://www.dormakabagroup.com/en/security-advisories

Restart Required: Yes

Instructions:

1. Monitor vendor advisory for patches. 2. Apply vendor-provided updates when available. 3. Restart affected services after patching.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate affected systems from untrusted networks using firewalls or network ACLs.

File System Permissions

all

Restrict file system permissions to limit accessible directories and files.

🧯 If You Can't Patch

  • Implement strict network access controls to limit connections to trusted sources only.
  • Monitor for unusual file access patterns and implement file integrity monitoring.

🔍 How to Verify

Check if Vulnerable:

Test with path traversal payloads like GET /../../Database.sq3 or similar directory traversal attempts.

Check Version:

Check Access Manager and CompactWebServer version via vendor documentation or system logs.

Verify Fix Applied:

Verify path traversal attempts return proper error responses instead of file contents.

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests containing ../ sequences
  • Unusual file access patterns
  • Web server crash/restart events

Network Indicators:

  • Multiple GET requests with path traversal patterns
  • Requests for Database.sq3 or other sensitive files

SIEM Query:

http.url:*../* AND (http.method:GET OR http.method:POST)

🔗 References

📤 Share & Export