CVE-2025-59105

N/A Unknown

📋 TL;DR

This CVE describes a physical access vulnerability where attackers can desolder flash memory chips from Dormakaba K7 (Linux) and K5 (Windows CE) access control devices to read/modify unencrypted sensitive data. Attackers can gain root SSH access on K7 models or extract plaintext passwords from K5 databases. Organizations using these physical access control systems are affected.

💻 Affected Systems

Products:
  • Dormakaba K7 access control system
  • Dormakaba K5 access control system
Versions: All versions with unencrypted flash storage (specific versions not disclosed in advisory)
Operating Systems: Linux (K7 model), Windows CE (K5 model)
Default Config Vulnerable: ⚠️ Yes
Notes: All default configurations are vulnerable due to lack of flash memory encryption. Physical device access is required.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete physical security compromise: attackers gain permanent unauthorized access to secured facilities by modifying device firmware/credentials, potentially creating backdoors that persist even after device replacement.

🟠

Likely Case

Targeted physical attacks on high-security facilities where attackers have extended physical access to devices, allowing credential theft and unauthorized access creation.

🟢

If Mitigated

Limited impact if devices are in physically secure locations with tamper detection, regular firmware validation, and network segmentation preventing lateral movement.

🌐 Internet-Facing: LOW - This requires physical device access, not network exploitation.
🏢 Internal Only: HIGH - Physical access to devices inside facilities enables full compromise of access control systems.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Requires physical access, soldering equipment, and technical skill to desolder/replace flash memory chips. No authentication needed once physical access obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not available

Vendor Advisory: https://www.dormakabagroup.com/en/security-advisories

Restart Required: No

Instructions:

No software patch available. Contact Dormakaba for hardware replacement options or physical security recommendations.

🔧 Temporary Workarounds

Physical Security Hardening

all

Implement tamper-evident enclosures, surveillance, and access controls to prevent physical device access

Network Segmentation

all

Isolate access control systems on separate VLANs to limit lateral movement if compromised

🧯 If You Can't Patch

  • Deploy tamper-evident seals and surveillance cameras monitoring all access control devices
  • Implement regular physical inspections and firmware integrity checks using cryptographic hashes

🔍 How to Verify

Check if Vulnerable:

Check device model: if Dormakaba K7 or K5, assume vulnerable. Physically inspect for flash memory encryption (typically not user-verifiable).

Check Version:

Not applicable - hardware vulnerability, not version dependent

Verify Fix Applied:

No software fix available. Verify physical security controls are implemented and devices are in secure locations.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected device reboots
  • SSH login attempts from unknown IPs (K7)
  • Access Manager password changes (K5)

Network Indicators:

  • Unusual network traffic from access control devices
  • SSH connections from unexpected locations

SIEM Query:

DeviceType="Dormakaba K7" OR DeviceType="Dormakaba K5" AND (EventType="PhysicalTamper" OR AuthenticationFailureCount>5)

🔗 References

📤 Share & Export