Instead of typical session tokens or cookies, it is verified on a per-request basis if the originating IP address has once successfully logged in. As soon as an authentication request from a certain source IP is successful, the IP address is handled as authenticated. No other session information is stored. Therefore, it is possible to spoof the IP address of a logged-in user to gain access to the Access Manager web interface.
Metrics
Affected Vendors & Products
References
History
Tue, 27 Jan 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Dormakaba
Dormakaba access Manager |
|
| Vendors & Products |
Dormakaba
Dormakaba access Manager |
Mon, 26 Jan 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 26 Jan 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Instead of typical session tokens or cookies, it is verified on a per-request basis if the originating IP address has once successfully logged in. As soon as an authentication request from a certain source IP is successful, the IP address is handled as authenticated. No other session information is stored. Therefore, it is possible to spoof the IP address of a logged-in user to gain access to the Access Manager web interface. | |
| Title | Insufficient Session Management in dormakaba access manager | |
| Weaknesses | CWE-291 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: SEC-VLab
Published:
Updated: 2026-01-26T16:00:07.304Z
Reserved: 2025-09-09T07:53:12.879Z
Link: CVE-2025-59101
Updated: 2026-01-26T15:59:59.184Z
Status : Awaiting Analysis
Published: 2026-01-26T10:16:07.850
Modified: 2026-01-26T15:03:33.357
Link: CVE-2025-59101
No data.