The binary serving the web server and executing basically all actions launched from the Web UI is running with root privileges. This is against the least privilege principle. If an attacker is able to execute code on the system via other vulnerabilities it is possible to directly execute commands with highest privileges.

Project Subscriptions

Vendors Products
Dormakaba Subscribe
Access Manager Subscribe
Dormakabagroup Subscribe
Dormakaba Access Manager 9200-k5 Subscribe
Dormakaba Access Manager 9200-k5 Firmware Subscribe
Dormakaba Access Manager 9200-k7 Subscribe
Dormakaba Access Manager 9200-k7 Firmware Subscribe
Dormakaba Access Manager 9230-k5 Subscribe
Dormakaba Access Manager 9230-k5 Firmware Subscribe
Dormakaba Access Manager 9230-k7 Subscribe
Dormakaba Access Manager 9230-k7 Firmware Subscribe
Dormakaba Access Manager 9290-k5 Subscribe
Dormakaba Access Manager 9290-k5 Firmware Subscribe
Dormakaba Access Manager 9290-k7 Subscribe
Dormakaba Access Manager 9290-k7 Firmware Subscribe
Advisories

No advisories yet.

Fixes

Solution

To secure the devices from unauthorized access, it is highly recommended to change the default password and update to at least firmware version BAME 06.00.x RA.


Workaround

No workaround given by the vendor.

History

Thu, 12 Feb 2026 16:00:00 +0000

Type Values Removed Values Added
First Time appeared Dormakabagroup
Dormakabagroup dormakaba Access Manager 9200-k5
Dormakabagroup dormakaba Access Manager 9200-k5 Firmware
Dormakabagroup dormakaba Access Manager 9200-k7
Dormakabagroup dormakaba Access Manager 9200-k7 Firmware
Dormakabagroup dormakaba Access Manager 9230-k5
Dormakabagroup dormakaba Access Manager 9230-k5 Firmware
Dormakabagroup dormakaba Access Manager 9230-k7
Dormakabagroup dormakaba Access Manager 9230-k7 Firmware
Dormakabagroup dormakaba Access Manager 9290-k5
Dormakabagroup dormakaba Access Manager 9290-k5 Firmware
Dormakabagroup dormakaba Access Manager 9290-k7
Dormakabagroup dormakaba Access Manager 9290-k7 Firmware
CPEs cpe:2.3:h:dormakabagroup:dormakaba_access_manager_9200-k5:-:*:*:*:*:*:*:*
cpe:2.3:h:dormakabagroup:dormakaba_access_manager_9200-k7:-:*:*:*:*:*:*:*
cpe:2.3:h:dormakabagroup:dormakaba_access_manager_9230-k5:-:*:*:*:*:*:*:*
cpe:2.3:h:dormakabagroup:dormakaba_access_manager_9230-k7:-:*:*:*:*:*:*:*
cpe:2.3:h:dormakabagroup:dormakaba_access_manager_9290-k5:-:*:*:*:*:*:*:*
cpe:2.3:h:dormakabagroup:dormakaba_access_manager_9290-k7:-:*:*:*:*:*:*:*
cpe:2.3:o:dormakabagroup:dormakaba_access_manager_9200-k5_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:dormakabagroup:dormakaba_access_manager_9200-k7_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:dormakabagroup:dormakaba_access_manager_9230-k5_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:dormakabagroup:dormakaba_access_manager_9230-k7_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:dormakabagroup:dormakaba_access_manager_9290-k5_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:dormakabagroup:dormakaba_access_manager_9290-k7_firmware:*:*:*:*:*:*:*:*
Vendors & Products Dormakabagroup
Dormakabagroup dormakaba Access Manager 9200-k5
Dormakabagroup dormakaba Access Manager 9200-k5 Firmware
Dormakabagroup dormakaba Access Manager 9200-k7
Dormakabagroup dormakaba Access Manager 9200-k7 Firmware
Dormakabagroup dormakaba Access Manager 9230-k5
Dormakabagroup dormakaba Access Manager 9230-k5 Firmware
Dormakabagroup dormakaba Access Manager 9230-k7
Dormakabagroup dormakaba Access Manager 9230-k7 Firmware
Dormakabagroup dormakaba Access Manager 9290-k5
Dormakabagroup dormakaba Access Manager 9290-k5 Firmware
Dormakabagroup dormakaba Access Manager 9290-k7
Dormakabagroup dormakaba Access Manager 9290-k7 Firmware

Tue, 27 Jan 2026 20:30:00 +0000

Type Values Removed Values Added
First Time appeared Dormakaba
Dormakaba access Manager
Vendors & Products Dormakaba
Dormakaba access Manager

Tue, 27 Jan 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 26 Jan 2026 10:15:00 +0000

Type Values Removed Values Added
Description The binary serving the web server and executing basically all actions launched from the Web UI is running with root privileges. This is against the least privilege principle. If an attacker is able to execute code on the system via other vulnerabilities it is possible to directly execute commands with highest privileges.
Title Web Server Running with Root Privileges in dormakaba access manager
Weaknesses CWE-272
References

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: SEC-VLab

Published:

Updated: 2026-01-27T18:44:41.817Z

Reserved: 2025-09-09T07:53:12.879Z

Link: CVE-2025-59106

cve-icon Vulnrichment

Updated: 2026-01-27T18:44:28.259Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-26T10:16:08.513

Modified: 2026-02-12T15:54:17.057

Link: CVE-2025-59106

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-01-27T20:17:58Z

Weaknesses