Metrics
Affected Vendors & Products
No advisories yet.
Solution
A firmware update to at least BAME 06.00.x RA is highly recommended. Hardware access and special equipment are required to exploit this vulnerability. In general, the Access Manager should be installed in a secured area and protected by a tamper contact.
Workaround
No workaround given by the vendor.
Tue, 27 Jan 2026 04:15:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 26 Jan 2026 19:15:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| Description | With physical access to the device and enough time an attacker is able to solder test leads to the debug footprint (or use the 6-Pin tag-connect cable). Thus, the attacker gains access to the bootloader, where the kernel command line can be changed. An attacker is able to gain a root shell through this vulnerability. | |
| Title | Unlocked Bootloader in dormakaba access manager | |
| Weaknesses | CWE-1234 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: SEC-VLab
Published:
Updated: 2026-01-26T15:12:47.211Z
Reserved: 2025-09-09T07:53:12.879Z
Link: CVE-2025-59104
Updated: 2026-01-26T15:12:43.726Z
Status : Awaiting Analysis
Published: 2026-01-26T10:16:08.247
Modified: 2026-01-26T15:03:33.357
Link: CVE-2025-59104
No data.
OpenCVE Enrichment
No data.