CVE-2025-59107 Overview
CVE-2025-59107 is a hardcoded credentials vulnerability affecting Dormakaba's FWServiceTool, a utility designed to update firmware versions of Access Managers over the network. The vulnerability exists because the tool uses a statically defined password to decrypt encrypted ZIP files containing firmware updates. An attacker who extracts this password can decrypt firmware packages, potentially enabling reverse engineering, modification, or analysis of firmware components across multiple versions.
Critical Impact
Hardcoded credentials in firmware update tools expose sensitive firmware packages to unauthorized decryption, potentially enabling firmware tampering, reverse engineering of security mechanisms, and supply chain attacks on physical access control systems.
Affected Products
- Dormakaba FWServiceTool (firmware update utility)
- Dormakaba Access Managers (devices receiving firmware updates)
- Encrypted firmware packages protected by the static password
Discovery Timeline
- 2026-01-26 - CVE-2025-59107 published to NVD
- 2026-01-26 - Last updated in NVD database
Technical Details for CVE-2025-59107
Vulnerability Analysis
This vulnerability is classified under CWE-798 (Use of Hard-coded Credentials), a critical security weakness that affects how the FWServiceTool handles firmware decryption. The core issue stems from the software storing a static, hardcoded password within the application binary that is used to decrypt encrypted ZIP files containing firmware images.
When Dormakaba's Access Manager devices require firmware updates, the FWServiceTool retrieves encrypted ZIP archives containing the new firmware. The password required to decrypt these archives is embedded directly in the tool's code rather than being derived dynamically or retrieved securely. An attacker with local access to the FWServiceTool can extract this password through static analysis or reverse engineering of the application binary.
The impact is compounded by the fact that this single password remains valid across multiple firmware versions, meaning successful extraction provides persistent access to decrypt past, current, and potentially future firmware packages until the password is rotated.
Root Cause
The root cause of CVE-2025-59107 is improper credential management in the software development lifecycle. Rather than implementing a secure key distribution mechanism, dynamic password derivation, or hardware-based key storage, the developers opted to hardcode the decryption password directly into the FWServiceTool application. This design choice treats the application binary as a trust boundary, assuming attackers cannot or will not analyze the compiled code—a fundamentally flawed security assumption.
Attack Vector
The attack vector for this vulnerability is local. An attacker requires access to a system where FWServiceTool is installed or access to the installation package itself. The exploitation process involves:
- Obtaining a copy of the FWServiceTool binary through legitimate software distribution channels or by accessing a system where it is installed
- Performing static analysis or reverse engineering on the binary to locate and extract the hardcoded password
- Using the extracted password to decrypt encrypted firmware ZIP files
- Analyzing, modifying, or weaponizing the extracted firmware content
Once the static password is extracted, the attacker can decrypt any firmware package protected by this password without requiring further access to target systems. This could enable identification of additional vulnerabilities in the firmware, creation of malicious firmware modifications, or understanding of proprietary security mechanisms in Dormakaba's physical access control systems.
Detection Methods for CVE-2025-59107
Indicators of Compromise
- Unauthorized access attempts to directories containing FWServiceTool installation files
- Reverse engineering tools (IDA Pro, Ghidra, radare2) executing against FWServiceTool binaries
- Unusual decryption operations on firmware ZIP files outside of normal update workflows
- Access to firmware files by unauthorized users or from unexpected network locations
Detection Strategies
- Monitor file access patterns on systems where FWServiceTool is installed, particularly access to the main executable
- Implement application whitelisting to detect reverse engineering tools being used on workstations with FWServiceTool
- Audit firmware file access and track chain of custody for firmware packages
- Deploy endpoint detection to identify extraction or copying of FWServiceTool binaries to unauthorized locations
Monitoring Recommendations
- Enable detailed audit logging on systems with FWServiceTool installations
- Monitor for abnormal process spawning patterns that may indicate binary analysis activities
- Track firmware download and distribution activities across the organization
- Implement network monitoring for unusual file transfers involving firmware packages or the FWServiceTool binary
How to Mitigate CVE-2025-59107
Immediate Actions Required
- Restrict access to FWServiceTool installations to only authorized personnel who require firmware update capabilities
- Implement strict access controls on systems where FWServiceTool is deployed
- Audit current deployments to identify all instances of the vulnerable software
- Contact Dormakaba support to inquire about updated versions that address this vulnerability
Patch Information
Organizations should consult Dormakaba Security Advisories for official patch information and remediation guidance. Additional technical details are available from SEC Consult's DKAccess Advisory and SEC Consult's Dormakaba Advisory.
Workarounds
- Limit distribution of FWServiceTool to the minimum number of required workstations
- Implement physical and logical access controls on systems containing firmware update tools
- Store firmware packages in encrypted, access-controlled repositories separate from the update tool
- Monitor and audit all firmware update activities with enhanced logging
# Configuration example - Restrict access to firmware update tools
# Limit file permissions on Linux/Unix systems
chmod 700 /opt/dormakaba/FWServiceTool
chown firmware-admin:firmware-admin /opt/dormakaba/FWServiceTool
# On Windows, use NTFS permissions to restrict access
# icacls "C:\Program Files\Dormakaba\FWServiceTool" /inheritance:r
# icacls "C:\Program Files\Dormakaba\FWServiceTool" /grant:r "Firmware-Admins:(OI)(CI)F"
Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.


