Description

The Access Manager is offering a trace functionality to debug errors and issues with the device. The trace functionality is implemented as a simple TCP socket. A tool called TraceClient.exe, provided by dormakaba via the Access Manager web interface, is used to connect to the socket and receive debug information. The data is permanently broadcasted on the TCP socket. The socket can be accessed without any authentication or encryption. The transmitted data is based on the set verbosity level. The verbosity level can be set using the http(s) endpoint with the service interface password or with the guessable identifier of the device via the SOAP interface. The transmitted data contains sensitive data like the Card ID as well as all button presses on Registration units. This allows an attacker with network level access to retrieve all entered PINs on a registration unit.

INFO

Published Date :

2026-01-26T10:04:51.022Z

Last Modified :

2026-01-26T16:07:50.727Z

Source :

SEC-VLab
AFFECTED PRODUCTS

The following products are affected by CVE-2025-59098 vulnerability.

Vendors Products
Dormakaba
  • Access Manager
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2025-59098.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Attack Requirements
Privileges Required
User Interaction
VS Confidentiality
VS Integrity
VS Availability
SS Confidentiality
SS Integrity
SS Availability