Metrics
Affected Vendors & Products
No advisories yet.
Solution
It is highly recommended to encrypt the communication to the Access Manager 92xx K5 via IPSec. The Configuration is described in the device reference manual. It is also recommended to secure the used communication port from external access. To encrypt the communication to the Access Manager 92xx K7, an mTLS connection can be set up. For new installations in combination with exos 4.4.x, HTTPS with self-signed certificates is activated by default. In existing installations, this must be configured manually. HTTPS with self-signed certificates can be configured at any time. The configuration is described in the device reference manual. It is also recommended to secure or close the used communication port from external access.
Workaround
No workaround given by the vendor.
Mon, 26 Jan 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 26 Jan 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | On the exos 9300 server, a SOAP API is reachable on port 8002. This API does not require any authentication prior to sending requests. Therefore, network access to the exos server allows e.g. the creation of arbitrary access log events as well as querying the 2FA PINs associated with the enrolled chip cards. | |
| Title | Unauthenticated SOAP API in dormakaba Kaba exos 9300 | |
| Weaknesses | CWE-1188 CWE-306 |
|
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: SEC-VLab
Published:
Updated: 2026-01-26T15:38:17.362Z
Reserved: 2025-09-09T07:52:56.382Z
Link: CVE-2025-59090
Updated: 2026-01-26T15:33:57.968Z
Status : Awaiting Analysis
Published: 2026-01-26T10:16:06.270
Modified: 2026-01-26T15:03:33.357
Link: CVE-2025-59090
No data.
OpenCVE Enrichment
No data.