CVE-2025-59102

N/A Unknown

📋 TL;DR

This vulnerability allows attackers to download the complete device database backup containing sensitive unencrypted PINs and encrypted MIFARE keys by exploiting authentication bypass issues. It affects Access Manager web servers where backup functionality is accessible without proper authentication. Organizations using vulnerable Access Manager devices are at risk of credential and access control compromise.

💻 Affected Systems

Products:
  • Access Manager web server
Versions: Unknown - check vendor advisory for specific versions
Operating Systems: Embedded systems running Access Manager
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerable when backup functionality is enabled and accessible via web interface or SOAP API.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of access control systems with theft of all user credentials, MIFARE keys, and configuration data leading to physical security breaches.

🟠

Likely Case

Attackers download database backups containing sensitive credentials and access control data for credential theft and privilege escalation.

🟢

If Mitigated

Limited impact if proper network segmentation and authentication controls prevent access to backup functionality.

🌐 Internet-Facing: HIGH - Web server functionality exposed to internet with multiple authentication bypass vectors.
🏢 Internal Only: HIGH - Internal attackers can exploit weak defaults or authentication bypass to access sensitive data.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Can be exploited via multiple authentication bypass methods including weak default passwords and SOAP API vulnerabilities.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown - check vendor advisory

Vendor Advisory: https://www.dormakabagroup.com/en/security-advisories

Restart Required: No

Instructions:

1. Check vendor advisory for patches. 2. Apply available security updates. 3. Verify backup functionality requires proper authentication.

🔧 Temporary Workarounds

Disable backup functionality

all

Disable database backup feature if not required

Network segmentation

all

Restrict access to Access Manager web interface to trusted networks only

🧯 If You Can't Patch

  • Change all default passwords to strong, unique credentials
  • Implement network access controls to restrict web interface access to authorized users only

🔍 How to Verify

Check if Vulnerable:

Attempt to access backup functionality without authentication or with default credentials

Check Version:

Check device web interface or consult vendor documentation

Verify Fix Applied:

Verify backup functionality requires proper authentication and strong credentials

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to backup endpoints
  • Database backup downloads from unusual sources

Network Indicators:

  • Unusual SOAP API requests to backup functionality
  • Large data transfers from device

SIEM Query:

source_ip=AccessManager AND (uri_path LIKE '%backup%' OR method=POST AND uri_path LIKE '%soap%')

🔗 References

📤 Share & Export