Instead of typical session tokens or cookies, it is verified on a per-request basis if the originating IP address has once successfully logged in. As soon as an authentication request from a certain source IP is successful, the IP address is handled as authenticated. No other session information is stored. Therefore, it is possible to spoof the IP address of a logged-in user to gain access to the Access Manager web interface.
Metrics
Affected Vendors & Products
References
History
Mon, 26 Jan 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Instead of typical session tokens or cookies, it is verified on a per-request basis if the originating IP address has once successfully logged in. As soon as an authentication request from a certain source IP is successful, the IP address is handled as authenticated. No other session information is stored. Therefore, it is possible to spoof the IP address of a logged-in user to gain access to the Access Manager web interface. | |
| Title | Insufficient Session Management in dormakaba access manager | |
| Weaknesses | CWE-291 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: SEC-VLab
Published:
Updated: 2026-01-26T10:05:20.665Z
Reserved: 2025-09-09T07:53:12.879Z
Link: CVE-2025-59101
No data.
Status : Received
Published: 2026-01-26T10:16:07.850
Modified: 2026-01-26T10:16:07.850
Link: CVE-2025-59101
No data.
OpenCVE Enrichment
No data.