With physical access to the device and enough time an attacker is able to solder test leads to the debug footprint (or use the 6-Pin tag-connect cable). Thus, the attacker gains access to the bootloader, where the kernel command line can be changed. An attacker is able to gain a root shell through this vulnerability.
History

Tue, 27 Jan 2026 20:30:00 +0000

Type Values Removed Values Added
First Time appeared Dormakaba
Dormakaba access Manager
Vendors & Products Dormakaba
Dormakaba access Manager

Mon, 26 Jan 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 26 Jan 2026 10:15:00 +0000

Type Values Removed Values Added
Description With physical access to the device and enough time an attacker is able to solder test leads to the debug footprint (or use the 6-Pin tag-connect cable). Thus, the attacker gains access to the bootloader, where the kernel command line can be changed. An attacker is able to gain a root shell through this vulnerability.
Title Unlocked Bootloader in dormakaba access manager
Weaknesses CWE-1234
References
Metrics cvssV4_0

{'score': 7, 'vector': 'CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: SEC-VLab

Published:

Updated: 2026-01-26T15:12:47.211Z

Reserved: 2025-09-09T07:53:12.879Z

Link: CVE-2025-59104

cve-icon Vulnrichment

Updated: 2026-01-26T15:12:43.726Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-01-26T10:16:08.247

Modified: 2026-01-26T15:03:33.357

Link: CVE-2025-59104

cve-icon Redhat

No data.