CVE-2025-59104

N/A Unknown

📋 TL;DR

This vulnerability allows attackers with physical access to modify the bootloader kernel command line via debug interfaces, leading to root shell access. It affects physical devices with exposed debug footprints, particularly in embedded systems or IoT devices. Organizations using vulnerable hardware in unsecured physical locations are at risk.

💻 Affected Systems

Products:
  • Specific dormakaba products (exact models not specified in CVE)
Versions: Not specified in CVE description
Operating Systems: Embedded/Linux-based systems
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability requires physical debug interface access; affects devices with exposed debug footprints.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device compromise allowing persistent root access, data theft, and potential lateral movement in connected networks.

🟠

Likely Case

Physical attacker gains root access to individual devices, potentially extracting sensitive data or modifying device functionality.

🟢

If Mitigated

Limited impact if devices are physically secured and debug interfaces are disabled or protected.

🌐 Internet-Facing: LOW - This requires physical access, not network access.
🏢 Internal Only: MEDIUM - Physical access to internal devices could lead to network compromise if devices are connected to internal networks.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Requires physical access and hardware skills (soldering or using tag-connect cable).

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified

Vendor Advisory: https://www.dormakabagroup.com/en/security-advisories

Restart Required: No

Instructions:

Check vendor advisory for specific patching instructions. Likely requires firmware update or hardware modification.

🔧 Temporary Workarounds

Disable debug interfaces

all

Physically disable or obscure debug footprints to prevent access

Secure boot configuration

linux

Configure bootloader to prevent command line modification

🧯 If You Can't Patch

  • Physically secure devices in locked enclosures with limited access
  • Implement tamper detection mechanisms and monitoring

🔍 How to Verify

Check if Vulnerable:

Check if device has exposed debug footprints and if bootloader allows command line modification

Check Version:

Check device firmware version against vendor advisory

Verify Fix Applied:

Verify debug interfaces are disabled/protected and bootloader configuration is secure

📡 Detection & Monitoring

Log Indicators:

  • Bootloader modification logs
  • Unexpected device reboots
  • Tamper detection alerts

Network Indicators:

  • Unusual device behavior or communications after physical access

SIEM Query:

Search for tamper alerts or unauthorized physical access to device locations

🔗 References

📤 Share & Export