Instituto Nacional de ciberseguridad. Sección Incibe
Instituto Nacional de Ciberseguridad. Sección INCIBE-CERT

Vulnerabilidades

Con el objetivo de informar, advertir y ayudar a los profesionales sobre las ultimas vulnerabilidades de seguridad en sistemas tecnológicos, ponemos a disposición de los usuarios interesados en esta información una base de datos con información en castellano sobre cada una de las ultimas vulnerabilidades documentadas y conocidas.

Este repositorio con más de 75.000 registros esta basado en la información de NVD (National Vulnerability Database) – en función de un acuerdo de colaboración – por el cual desde INCIBE realizamos la traducción al castellano de la información incluida. En ocasiones este listado mostrará vulnerabilidades que aún no han sido traducidas debido a que se recogen en el transcurso del tiempo en el que el equipo de INCIBE realiza el proceso de traducción.

Se emplea el estándar de nomenclatura de vulnerabilidades CVE (Common Vulnerabilities and Exposures), con el fin de facilitar el intercambio de información entre diferentes bases de datos y herramientas. Cada una de las vulnerabilidades recogidas enlaza a diversas fuentes de información así como a parches disponibles o soluciones aportadas por los fabricantes y desarrolladores. Es posible realizar búsquedas avanzadas teniendo la opción de seleccionar diferentes criterios como el tipo de vulnerabilidad, fabricante, tipo de impacto entre otros, con el fin de acortar los resultados.

Mediante suscripción RSS o Boletines podemos estar informados diariamente de las ultimas vulnerabilidades incorporadas al repositorio.

CVE-2025-59108

Fecha de publicación:
26/01/2026
Idioma:
Inglés
*** Pendiente de traducción *** By default, the password for the Access Manager's web interface, is set to 'admin'. In the tested version changing the password was not enforced.
Gravedad CVSS v4.0: CRÍTICA
Última modificación:
26/01/2026

CVE-2025-59109

Fecha de publicación:
26/01/2026
Idioma:
Inglés
*** Pendiente de traducción *** The dormakaba registration units 9002 (PIN Pad Units) have an exposed UART header on the backside. The PIN pad is sending every button press to the UART interface. An attacker can use the interface to exfiltrate PINs. As the devices are explicitly built as Plug-and-Play to be easily replaced, an attacker is easily able to remove the device, install a hardware implant which connects to the UART and exfiltrates the data exposed via UART to another system (e.g. via WiFi).
Gravedad CVSS v4.0: MEDIA
Última modificación:
26/01/2026

CVE-2025-59096

Fecha de publicación:
26/01/2026
Idioma:
Inglés
*** Pendiente de traducción *** The default password for the extended admin user mode in the application U9ExosAdmin.exe ("Kaba 9300 Administration") is hard-coded in multiple locations as well as documented in the locally stored user documentation.
Gravedad CVSS v4.0: MEDIA
Última modificación:
26/01/2026

CVE-2025-59097

Fecha de publicación:
26/01/2026
Idioma:
Inglés
*** Pendiente de traducción *** The exos 9300 application can be used to configure Access Managers (e.g. 92xx, 9230 and 9290). The configuration is done in a graphical user interface on the dormakaba exos server. As soon as the save button is clicked in exos 9300, the whole configuration is sent to the selected Access Manager via SOAP. The SOAP request is sent without any prior authentication or authorization by default. Though authentication and authorization can be configured using IPsec for 92xx-K5 devices and mTLS for 92xx-K7 devices, it is not enabled by default and must therefore be activated with additional steps.<br /> <br /> This insecure default allows an attacker with network level access to completely control the whole environment. An attacker is for example easily able to conduct the following tasks without prior authentication:<br /> - Re-configure Access Managers (e.g. remove alarming system requirements)<br /> - Freely re-configure the inputs and outputs<br /> - Open all connected doors permanently<br /> - Open all doors for a defined time interval<br /> - Change the admin password<br /> - and many more<br /> <br /> Network level access can be gained due to an insufficient network segmentation as well as missing LAN firewalls. Devices with an insecure configuration have been identified to be directly exposed to the internet.
Gravedad CVSS v4.0: CRÍTICA
Última modificación:
26/01/2026

CVE-2025-59098

Fecha de publicación:
26/01/2026
Idioma:
Inglés
*** Pendiente de traducción *** The Access Manager is offering a trace functionality to debug errors and issues with the device. The trace functionality is implemented as a simple TCP socket. A tool called TraceClient.exe, provided by dormakaba via the Access Manager web interface, is used to connect to the socket and receive debug information. The data is permanently broadcasted on the TCP socket. The socket can be accessed without any authentication or encryption. <br /> <br /> The transmitted data is based on the set verbosity level. The verbosity level can be set using the http(s) endpoint with the service interface password or with the guessable identifier of the device via the SOAP interface.<br /> <br /> The transmitted data contains sensitive data like the Card ID as well as all button presses on Registration units. This allows an attacker with network level access to retrieve all entered PINs on a registration unit.
Gravedad CVSS v4.0: ALTA
Última modificación:
26/01/2026

CVE-2025-59099

Fecha de publicación:
26/01/2026
Idioma:
Inglés
*** Pendiente de traducción *** The Access Manager is using the open source web server CompactWebServer written in C#. This web server is affected by a path traversal vulnerability, which allows an attacker to directly access files via simple GET requests without prior authentication. <br /> <br /> Hence, it is possible to retrieve all files stored on the file system, including the SQLite database Database.sq3, containing badge information and the corresponding PIN codes. Additionally, when trying to access certain files, the web server crashes and becomes unreachable for about 60 seconds. This can be abused to continuously send the request and cause denial of service.
Gravedad CVSS v4.0: ALTA
Última modificación:
26/01/2026

CVE-2025-59100

Fecha de publicación:
26/01/2026
Idioma:
Inglés
*** Pendiente de traducción *** The web interface offers a functionality to export the internal SQLite database. After executing the database export, an automatic download is started and the device reboots. After rebooting, the exported database is deleted and cannot be accessed anymore. However, it was noticed that sometimes the device does not reboot and therefore the exported database is not deleted, or the device reboots and the export is not deleted for unknown reasons. The path where the database export is located can be accessed without prior authentication. This leads to the fact that an attacker might be able to get access to the exported database without prior authentication. <br /> The database includes sensitive data like passwords, card pins, encrypted Mifare sitekeys and much more.
Gravedad CVSS v4.0: MEDIA
Última modificación:
26/01/2026

CVE-2025-59101

Fecha de publicación:
26/01/2026
Idioma:
Inglés
*** Pendiente de traducción *** Instead of typical session tokens or cookies, it is verified on a per-request basis if the originating IP address has once successfully logged in. As soon as an authentication request from a certain source IP is successful, the IP address is handled as authenticated. No other session information is stored. Therefore, it is possible to spoof the IP address of a logged-in user to gain access to the Access Manager web interface.
Gravedad CVSS v4.0: ALTA
Última modificación:
26/01/2026

CVE-2025-59102

Fecha de publicación:
26/01/2026
Idioma:
Inglés
*** Pendiente de traducción *** The web server of the Access Manager offers a functionality to download a backup of the local database stored on the device. This database contains the whole configuration. This includes encrypted MIFARE keys, card data, user PINs and much more. The PINs are even stored unencrypted. Combined with the fact that an attacker can easily get access to the backup functionality by abusing the session management issue (CVE-2025-59101), or by exploiting the weak default password (CVE-2025-59108), or by simply setting a new password without prior authentication via the SOAP API (CVE-2025-59097), it is easily possible to access the sensitive data on the device.
Gravedad CVSS v4.0: MEDIA
Última modificación:
26/01/2026

CVE-2025-41083

Fecha de publicación:
26/01/2026
Idioma:
Inglés
*** Pendiente de traducción *** Vulnerability in Altitude Authentication Service and Altitude Communication Server v8.5.3290.0 by Altitude, where manipulation of Host header in HTTP requests allows redirection to an arbitrary URL or modification of the base URL to trick the victim into sending login credentials to a malicious website. This behavior can be used to redirect clients to endpoints controlled by the attacker.
Gravedad CVSS v4.0: MEDIA
Última modificación:
26/01/2026

CVE-2025-59090

Fecha de publicación:
26/01/2026
Idioma:
Inglés
*** Pendiente de traducción *** On the exos 9300 server, a SOAP API is reachable on port 8002. This API does not require any authentication prior to sending requests. Therefore, network access to the exos server allows e.g. the creation of arbitrary access log events as well as querying the 2FA PINs associated with the enrolled chip cards.
Gravedad CVSS v4.0: CRÍTICA
Última modificación:
26/01/2026

CVE-2025-59091

Fecha de publicación:
26/01/2026
Idioma:
Inglés
*** Pendiente de traducción *** Multiple hardcoded credentials have been identified, which are allowed to sign-in to the exos 9300 datapoint server running on port 1004 and 1005. This server is used for relaying status information from and to the Access Managers. This information, among other things, is used to graphically visualize open doors and alerts. However, controlling the Access Managers via this interface is also possible.<br /> <br /> To send and receive status information, authentication is necessary. The Kaba exos 9300 application contains hard-coded credentials for four different users, which are allowed to login to the datapoint server and receive as well as send information, including commands to open arbitrary doors.
Gravedad CVSS v4.0: CRÍTICA
Última modificación:
26/01/2026