← Zuruck zu CVEs
CVE-2025-59101
N/ABeschreibung
Instead of typical session tokens or cookies, it is verified on a per-request basis if the originating IP address has once successfully logged in. As soon as an authentication request from a certain source IP is successful, the IP address is handled as authenticated. No other session information is stored. Therefore, it is possible to spoof the IP address of a logged-in user to gain access to the Access Manager web interface.
CVE Details
CVSS v3.1 BewertungN/A
Veroffentlicht1/26/2026
Zuletzt geandert1/26/2026
Quellenvd
Honeypot-Sichtungen0
Schwachen (CWE)
CWE-291
Referenzen
https://r.sec-consult.com/dkaccess(551230f0-3615-47bd-b7cc-93e92e730bbf)
https://r.sec-consult.com/dormakaba(551230f0-3615-47bd-b7cc-93e92e730bbf)
https://www.dormakabagroup.com/en/security-advisories(551230f0-3615-47bd-b7cc-93e92e730bbf)
IOC Korrelationen
Keine Korrelationen erfasst
This product uses data from the NVD API but is not endorsed or certified by the NVD.