CVE-2025-59101

N/A Unknown

📋 TL;DR

This vulnerability allows attackers to bypass authentication in Dormakaba Access Manager by spoofing the IP address of a previously authenticated user. The system authenticates based solely on source IP addresses after initial successful login, with no session tokens or cookies. Organizations using affected Dormakaba Access Manager products are vulnerable to unauthorized access.

💻 Affected Systems

Products:
  • Dormakaba Access Manager
Versions: Specific versions not detailed in references, but appears to affect current deployments
Operating Systems: Not specified, likely embedded systems running Access Manager
Default Config Vulnerable: ⚠️ Yes
Notes: Affects systems using IP-based authentication without session management. The vulnerability exists in the authentication mechanism design.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of physical access control systems allowing unauthorized entry to secured facilities, manipulation of access permissions, and potential physical security breaches.

🟠

Likely Case

Unauthorized access to the Access Manager web interface leading to privilege escalation, user account manipulation, and access control rule modification.

🟢

If Mitigated

Limited impact if network segmentation prevents IP spoofing and if the interface is not internet-facing.

🌐 Internet-Facing: HIGH - Directly exploitable from the internet if the web interface is exposed, as IP spoofing can be performed remotely.
🏢 Internal Only: MEDIUM - Requires internal network access but IP spoofing is still possible within the network, especially in flat network architectures.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires IP spoofing capability but no authentication is needed once the target IP has authenticated. Attackers need to identify an authenticated IP address to spoof.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified in references

Vendor Advisory: https://www.dormakabagroup.com/en/security-advisories

Restart Required: Yes

Instructions:

1. Check Dormakaba security advisory for specific patch details. 2. Apply vendor-provided firmware/software updates. 3. Restart Access Manager services. 4. Verify authentication now uses proper session management.

🔧 Temporary Workarounds

Network Segmentation and ACLs

all

Restrict access to Access Manager web interface using network access control lists and segment the network to prevent IP spoofing.

Disable IP-Based Authentication

all

Configure Access Manager to use proper session tokens or multi-factor authentication instead of IP-based authentication.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Access Manager from untrusted networks
  • Deploy intrusion prevention systems with IP spoofing detection and blocking capabilities

🔍 How to Verify

Check if Vulnerable:

Test if you can access the Access Manager web interface by spoofing an IP address that has previously authenticated. Check authentication logs for IP-based authentication patterns.

Check Version:

Check Access Manager web interface version in admin panel or consult vendor documentation for version checking.

Verify Fix Applied:

Verify that authentication now requires session tokens or cookies, not just IP address. Test that IP spoofing no longer grants access.

📡 Detection & Monitoring

Log Indicators:

  • Multiple successful logins from same IP in quick succession
  • Authentication attempts from IP addresses that shouldn't have access
  • Access from IPs without corresponding login events

Network Indicators:

  • IP spoofing attempts detected by network security devices
  • Unusual traffic patterns to Access Manager interface

SIEM Query:

source_ip=AccessManager AND (event_type="authentication_success" OR event_type="access_granted") | stats count by source_ip | where count > threshold

🔗 References

📤 Share & Export