The binary serving the web server and executing basically all actions launched from the Web UI is running with root privileges. This is against the least privilege principle. If an attacker is able to execute code on the system via other vulnerabilities it is possible to directly execute commands with highest privileges.
History

Tue, 27 Jan 2026 20:30:00 +0000

Type Values Removed Values Added
First Time appeared Dormakaba
Dormakaba access Manager
Vendors & Products Dormakaba
Dormakaba access Manager

Tue, 27 Jan 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 26 Jan 2026 10:15:00 +0000

Type Values Removed Values Added
Description The binary serving the web server and executing basically all actions launched from the Web UI is running with root privileges. This is against the least privilege principle. If an attacker is able to execute code on the system via other vulnerabilities it is possible to directly execute commands with highest privileges.
Title Web Server Running with Root Privileges in dormakaba access manager
Weaknesses CWE-272
References

cve-icon MITRE

Status: PUBLISHED

Assigner: SEC-VLab

Published:

Updated: 2026-01-27T18:44:41.817Z

Reserved: 2025-09-09T07:53:12.879Z

Link: CVE-2025-59106

cve-icon Vulnrichment

Updated: 2026-01-27T18:44:28.259Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-01-26T10:16:08.513

Modified: 2026-01-27T19:16:11.947

Link: CVE-2025-59106

cve-icon Redhat

No data.