CVE-2025-59102
📋 TL;DR
This vulnerability allows attackers to download the complete device database backup containing sensitive unencrypted PINs and encrypted MIFARE keys by exploiting authentication bypass issues. It affects Access Manager web servers where backup functionality is accessible without proper authentication. Organizations using vulnerable Access Manager devices are at risk of credential and access control compromise.
💻 Affected Systems
- Access Manager web server
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Complete compromise of access control systems with theft of all user credentials, MIFARE keys, and configuration data leading to physical security breaches.
Likely Case
Attackers download database backups containing sensitive credentials and access control data for credential theft and privilege escalation.
If Mitigated
Limited impact if proper network segmentation and authentication controls prevent access to backup functionality.
🎯 Exploit Status
Can be exploited via multiple authentication bypass methods including weak default passwords and SOAP API vulnerabilities.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown - check vendor advisory
Vendor Advisory: https://www.dormakabagroup.com/en/security-advisories
Restart Required: No
Instructions:
1. Check vendor advisory for patches. 2. Apply available security updates. 3. Verify backup functionality requires proper authentication.
🔧 Temporary Workarounds
Disable backup functionality
allDisable database backup feature if not required
Network segmentation
allRestrict access to Access Manager web interface to trusted networks only
🧯 If You Can't Patch
- Change all default passwords to strong, unique credentials
- Implement network access controls to restrict web interface access to authorized users only
🔍 How to Verify
Check if Vulnerable:
Attempt to access backup functionality without authentication or with default credentials
Check Version:
Check device web interface or consult vendor documentation
Verify Fix Applied:
Verify backup functionality requires proper authentication and strong credentials
📡 Detection & Monitoring
Log Indicators:
- Unauthorized access attempts to backup endpoints
- Database backup downloads from unusual sources
Network Indicators:
- Unusual SOAP API requests to backup functionality
- Large data transfers from device
SIEM Query:
source_ip=AccessManager AND (uri_path LIKE '%backup%' OR method=POST AND uri_path LIKE '%soap%')