Description

Exos 9300 instances are using a randomly generated database password to connect to the configured MSSQL server. The password is derived from static random values, which are concatenated to the hostname and a random string that can be read by every user from the registry. This allows an attacker to derive the database password and get authenticated access to the central exos 9300 database as the user Exos9300Common. The user has the roles ExosDialog and ExosDialogDotNet assigned, which are able to read most tables of the database as well as update and insert into many tables.

INFO

Published Date :

2026-01-26T10:03:54.991Z

Last Modified :

2026-01-26T17:24:52.738Z

Source :

SEC-VLab
AFFECTED PRODUCTS

The following products are affected by CVE-2025-59093 vulnerability.

Vendors Products
Dormakaba
  • Kaba Exos 9300
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2025-59093.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Attack Requirements
Privileges Required
User Interaction
VS Confidentiality
VS Integrity
VS Availability
SS Confidentiality
SS Integrity
SS Availability