On the exos 9300 server, a SOAP API is reachable on port 8002. This API does not require any authentication prior to sending requests. Therefore, network access to the exos server allows e.g. the creation of arbitrary access log events as well as querying the 2FA PINs associated with the enrolled chip cards.
Advisories

No advisories yet.

Fixes

Solution

It is highly recommended to encrypt the communication to the Access Manager 92xx K5 via IPSec. The Configuration is described in the device reference manual. It is also recommended to secure the used communication port from external access. To encrypt the communication to the Access Manager 92xx K7, an mTLS connection can be set up. For new installations in combination with exos 4.4.x, HTTPS with self-signed certificates is activated by default. In existing installations, this must be configured manually. HTTPS with self-signed certificates can be configured at any time. The configuration is described in the device reference manual. It is also recommended to secure or close the used communication port from external access.


Workaround

No workaround given by the vendor.

History

Tue, 27 Jan 2026 20:30:00 +0000

Type Values Removed Values Added
First Time appeared Dormakaba
Dormakaba kaba Exos 9300
Vendors & Products Dormakaba
Dormakaba kaba Exos 9300

Mon, 26 Jan 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 26 Jan 2026 10:15:00 +0000

Type Values Removed Values Added
Description On the exos 9300 server, a SOAP API is reachable on port 8002. This API does not require any authentication prior to sending requests. Therefore, network access to the exos server allows e.g. the creation of arbitrary access log events as well as querying the 2FA PINs associated with the enrolled chip cards.
Title Unauthenticated SOAP API in dormakaba Kaba exos 9300
Weaknesses CWE-1188
CWE-306
References
Metrics cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: SEC-VLab

Published:

Updated: 2026-01-26T15:38:17.362Z

Reserved: 2025-09-09T07:52:56.382Z

Link: CVE-2025-59090

cve-icon Vulnrichment

Updated: 2026-01-26T15:33:57.968Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-01-26T10:16:06.270

Modified: 2026-01-26T15:03:33.357

Link: CVE-2025-59090

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-01-27T20:17:52Z

Weaknesses