With physical access to the device and enough time an attacker is able to solder test leads to the debug footprint (or use the 6-Pin tag-connect cable). Thus, the attacker gains access to the bootloader, where the kernel command line can be changed. An attacker is able to gain a root shell through this vulnerability.
History

Mon, 26 Jan 2026 10:15:00 +0000

Type Values Removed Values Added
Description With physical access to the device and enough time an attacker is able to solder test leads to the debug footprint (or use the 6-Pin tag-connect cable). Thus, the attacker gains access to the bootloader, where the kernel command line can be changed. An attacker is able to gain a root shell through this vulnerability.
Title Unlocked Bootloader in dormakaba access manager
Weaknesses CWE-1234
References
Metrics cvssV4_0

{'score': 7, 'vector': 'CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: SEC-VLab

Published:

Updated: 2026-01-26T10:05:54.218Z

Reserved: 2025-09-09T07:53:12.879Z

Link: CVE-2025-59104

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-01-26T10:16:08.247

Modified: 2026-01-26T10:16:08.247

Link: CVE-2025-59104

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.