The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2025-59093

CVE-2025-59093: Exos 9300 Auth Bypass Vulnerability

CVE-2025-59093 is an authentication bypass vulnerability in Exos 9300 that exposes predictable database passwords, allowing unauthorized database access. This post covers technical details, affected versions, and mitigation.

Published: January 30, 2026

CVE-2025-59093 Overview

CVE-2025-59093 is a high-severity vulnerability affecting Dormakaba Exos 9300 access control systems. The vulnerability stems from insecure database password generation, where the password used to connect to the configured MSSQL server is derived from static random values concatenated with the hostname and a random string that can be read by any user from the Windows registry. This allows an attacker with local access to derive the database password and gain authenticated access to the central Exos 9300 database.

Critical Impact

Attackers can derive database credentials and gain unauthorized access to the Exos 9300 MSSQL database, enabling them to read sensitive data from most tables and perform updates and inserts into many tables as the Exos9300Common user.

Affected Products

  • Dormakaba Exos 9300 access control system instances
  • MSSQL database configurations connected to Exos 9300

Discovery Timeline

  • 2026-01-26 - CVE-2025-59093 published to NVD
  • 2026-01-26 - Last updated in NVD database

Technical Details for CVE-2025-59093

Vulnerability Analysis

The vulnerability falls under CWE-656 (Reliance on Security Through Obscurity). The Exos 9300 system employs a flawed password generation mechanism that relies on predictable components rather than cryptographically secure random generation. The database password is constructed by concatenating static random values with the system hostname and a random string stored in the Windows registry.

Since the registry key containing the random string component is readable by any local user, an attacker with basic user-level access to the system can retrieve this value. Combined with knowledge of the static values used in the algorithm and the hostname (which is easily obtainable), an attacker can reconstruct the complete database password.

Once authenticated to the database, the attacker operates under the Exos9300Common user context, which has the ExosDialog and ExosDialogDotNet roles assigned. These roles provide extensive permissions including the ability to read data from most database tables and perform write operations (UPDATE and INSERT) on many tables.

Root Cause

The root cause is the reliance on a deterministic password derivation algorithm that uses predictable or accessible components. The design violates secure password management principles by:

  1. Using static random values that remain constant across installations
  2. Incorporating the hostname, which is publicly known information
  3. Storing the remaining random component in a registry location accessible to all local users

This approach assumes security through obscurity rather than implementing proper cryptographic key management practices.

Attack Vector

The attack requires local access to the system. An attacker must:

  1. Obtain local user access to a machine running the Exos 9300 software
  2. Read the random string component from the Windows registry
  3. Obtain the system hostname
  4. Apply the known password derivation algorithm using the static values
  5. Connect to the MSSQL server using the derived credentials as Exos9300Common

The vulnerability mechanism relies on the predictable nature of the password derivation. The attacker queries the registry for the stored random component, combines it with the static seed values and hostname using the known algorithm, and produces valid database credentials. For complete technical details, refer to the SEC Consult Security Advisory.

Detection Methods for CVE-2025-59093

Indicators of Compromise

  • Unexpected registry access patterns to Exos 9300 configuration keys by non-service accounts
  • Anomalous database connections to the Exos 9300 MSSQL database from unexpected user accounts or workstations
  • Unusual read queries against sensitive tables in the Exos 9300 database
  • Database INSERT or UPDATE operations occurring outside normal operational hours or patterns

Detection Strategies

  • Monitor Windows Security Event Log for registry access events (Event ID 4663) targeting Exos 9300 registry keys
  • Configure MSSQL auditing to log all connections and queries made by the Exos9300Common user
  • Implement database activity monitoring to detect bulk data extraction or unauthorized modifications
  • Deploy endpoint detection to alert on processes reading specific registry paths associated with Exos 9300

Monitoring Recommendations

  • Enable verbose logging on the MSSQL server hosting the Exos 9300 database
  • Configure alerts for database connections from non-standard source IPs or hosts
  • Implement file integrity monitoring on Exos 9300 installation directories
  • Review database audit logs regularly for signs of enumeration or data exfiltration

How to Mitigate CVE-2025-59093

Immediate Actions Required

  • Restrict network access to the MSSQL server hosting Exos 9300 data to only authorized application servers
  • Implement Windows registry ACLs to restrict read access to Exos 9300 configuration keys to only required service accounts
  • Review and audit database access permissions for the Exos9300Common user and associated roles
  • Enable SQL Server authentication auditing and monitor for suspicious connection patterns

Patch Information

Consult the Dormakaba Security Advisories page for official patch information and updated software versions that address this vulnerability. Organizations should contact Dormakaba support to obtain the latest security updates for their Exos 9300 installations.

Workarounds

  • Implement network segmentation to isolate the MSSQL database server from general user networks
  • Apply the principle of least privilege to the Exos9300Common database user by reviewing and restricting assigned roles
  • Deploy database firewall solutions to restrict SQL query types and patterns
  • Consider implementing additional authentication layers such as SQL Server Always Encrypted for sensitive columns
bash
# Example: Restrict registry key permissions (PowerShell)
$acl = Get-Acl "HKLM:\SOFTWARE\Dormakaba\Exos9300"
$acl.SetAccessRuleProtection($true, $false)
# Configure appropriate access rules for service accounts only
Set-Acl "HKLM:\SOFTWARE\Dormakaba\Exos9300" $acl

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeAuth Bypass

  • Vendor/TechExos

  • SeverityHIGH

  • CVSS Score8.5

  • EPSS Probability0.01%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • CWE-656
  • Technical References
  • SEC Consult Security Advisory

  • SEC Consult Security Advisory

  • Dormakaba Security Advisories
  • Related CVEs
  • CVE-2025-59092: Kaba exos 9300 Auth Bypass Vulnerability

  • CVE-2025-59090: EXOS 9300 Server Auth Bypass Vulnerability

  • CVE-2025-59095: EXOS 9300 Information Disclosure Flaw
Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English