Metrics
Affected Vendors & Products
No advisories yet.
Solution
To secure the devices from unauthorized access, it is highly recommended to change the default password and update to at least firmware version BAME 06.00.x RA.
Workaround
No workaround given by the vendor.
Tue, 27 Jan 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Dormakaba
Dormakaba access Manager |
|
| Vendors & Products |
Dormakaba
Dormakaba access Manager |
Tue, 27 Jan 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Mon, 26 Jan 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The binary serving the web server and executing basically all actions launched from the Web UI is running with root privileges. This is against the least privilege principle. If an attacker is able to execute code on the system via other vulnerabilities it is possible to directly execute commands with highest privileges. | |
| Title | Web Server Running with Root Privileges in dormakaba access manager | |
| Weaknesses | CWE-272 | |
| References |
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: SEC-VLab
Published:
Updated: 2026-01-27T18:44:41.817Z
Reserved: 2025-09-09T07:53:12.879Z
Link: CVE-2025-59106
Updated: 2026-01-27T18:44:28.259Z
Status : Awaiting Analysis
Published: 2026-01-26T10:16:08.513
Modified: 2026-01-27T19:16:11.947
Link: CVE-2025-59106
No data.
OpenCVE Enrichment
Updated: 2026-01-27T20:17:58Z