CVE-2025-59108

N/A Unknown

📋 TL;DR

This vulnerability allows attackers to access the Access Manager's web interface using the default password 'admin' since password changes are not enforced. It affects systems running vulnerable versions of dormakaba Access Manager software. This creates a weak authentication mechanism that can be easily exploited.

💻 Affected Systems

Products:
  • dormakaba Access Manager
Versions: Specific vulnerable versions not specified in advisory, but appears to affect tested versions
Operating Systems: Embedded systems running dormakaba software
Default Config Vulnerable: ⚠️ Yes
Notes: Affects systems where password change enforcement is not properly implemented

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise allowing attackers to modify access control settings, disable security features, or gain physical access to secured areas.

🟠

Likely Case

Unauthorized access to the management interface leading to configuration changes, privilege escalation, or surveillance of access patterns.

🟢

If Mitigated

Limited impact if strong network segmentation and monitoring are in place, though authentication bypass remains possible.

🌐 Internet-Facing: HIGH - If exposed to the internet, attackers can easily brute force or guess the default credentials.
🏢 Internal Only: MEDIUM - Internal attackers or compromised internal systems could exploit this, but requires network access.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires knowledge of the default credentials but is trivial once known

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified in provided references

Vendor Advisory: https://www.dormakabagroup.com/en/security-advisories

Restart Required: Yes

Instructions:

1. Consult dormakaba security advisory for specific patch details
2. Apply recommended firmware updates
3. Restart affected systems
4. Verify password enforcement is working

🔧 Temporary Workarounds

Enforce Strong Password Policy

all

Manually change default password and implement password policy enforcement

Access web interface and change 'admin' password to strong unique password

Network Segmentation

all

Isolate Access Manager systems from untrusted networks

Configure firewall rules to restrict access to management interface

🧯 If You Can't Patch

  • Implement network access controls to restrict management interface access
  • Enable logging and monitoring for authentication attempts on the web interface

🔍 How to Verify

Check if Vulnerable:

Attempt to log into Access Manager web interface with username 'admin' and password 'admin'

Check Version:

Check firmware version in web interface or consult vendor documentation

Verify Fix Applied:

Verify password change is enforced and default credentials no longer work

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed login attempts followed by successful 'admin' login
  • Login events from unexpected IP addresses

Network Indicators:

  • HTTP requests to management interface from unauthorized sources
  • Traffic patterns suggesting credential guessing

SIEM Query:

source="access_manager" AND (event="login_success" AND user="admin") OR (event="login_failed" AND user="admin")

🔗 References

📤 Share & Export