With physical access to the device and enough time an attacker is able to solder test leads to the debug footprint (or use the 6-Pin tag-connect cable). Thus, the attacker gains access to the bootloader, where the kernel command line can be changed. An attacker is able to gain a root shell through this vulnerability.
Advisories

No advisories yet.

Fixes

Solution

A firmware update to at least BAME 06.00.x RA is highly recommended. Hardware access and special equipment are required to exploit this vulnerability. In general, the Access Manager should be installed in a secured area and protected by a tamper contact.


Workaround

No workaround given by the vendor.

History

Tue, 27 Jan 2026 04:15:00 +0900

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 26 Jan 2026 19:15:00 +0900

Type Values Removed Values Added
Description With physical access to the device and enough time an attacker is able to solder test leads to the debug footprint (or use the 6-Pin tag-connect cable). Thus, the attacker gains access to the bootloader, where the kernel command line can be changed. An attacker is able to gain a root shell through this vulnerability.
Title Unlocked Bootloader in dormakaba access manager
Weaknesses CWE-1234
References
Metrics cvssV4_0

{'score': 7, 'vector': 'CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: SEC-VLab

Published:

Updated: 2026-01-26T15:12:47.211Z

Reserved: 2025-09-09T07:53:12.879Z

Link: CVE-2025-59104

cve-icon Vulnrichment

Updated: 2026-01-26T15:12:43.726Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-01-26T10:16:08.247

Modified: 2026-01-26T15:03:33.357

Link: CVE-2025-59104

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses