CVE-2025-59098

N/A Unknown
Published: January 26, 2026 Modified: January 26, 2026
View on NVD

Description

The Access Manager is offering a trace functionality to debug errors and issues with the device. The trace functionality is implemented as a simple TCP socket. A tool called TraceClient.exe, provided by dormakaba via the Access Manager web interface, is used to connect to the socket and receive debug information. The data is permanently broadcasted on the TCP socket. The socket can be accessed without any authentication or encryption. The transmitted data is based on the set verbosity level. The verbosity level can be set using the http(s) endpoint with the service interface password or with the guessable identifier of the device via the SOAP interface. The transmitted data contains sensitive data like the Card ID as well as all button presses on Registration units. This allows an attacker with network level access to retrieve all entered PINs on a registration unit.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
https://r.sec-consult.com/dkaccess
Source: 551230f0-3615-47bd-b7cc-93e92e730bbf
https://r.sec-consult.com/dormakaba
Source: 551230f0-3615-47bd-b7cc-93e92e730bbf
https://www.dormakabagroup.com/en/security-advisories
Source: 551230f0-3615-47bd-b7cc-93e92e730bbf

3 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
0.1%
17th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)