Dormakaba access systems vulnerable to remote door unlocking

SCM feed for Latest

Overview

SEC Consult has identified several security vulnerabilities in Dormakaba's exos 9300 access systems, including hardcoded credentials, weak passwords, and command injection flaws. These vulnerabilities could allow attackers to remotely unlock doors, posing a significant risk to physical security in facilities that rely on these systems. Dormakaba, a leading provider of access control solutions, serves a wide range of industries, meaning many organizations could be affected. Users of the exos 9300 need to be aware of these vulnerabilities and take immediate action to secure their systems to prevent unauthorized access. The findings emphasize the need for strong security practices in access control systems, especially in critical infrastructure.

Key Takeaways

  • Affected Systems: Dormakaba exos 9300 access systems
  • Action Required: Users should change hardcoded credentials and implement stronger password policies.
  • Timeline: Newly disclosed

Original Article Summary

The security flaws, including hardcoded credentials, weak passwords, and command injection, were identified by SEC Consult in the exos 9300 ecosystem.

Impact

Dormakaba exos 9300 access systems

Exploitation Status

The exploitation status is currently unknown. Monitor vendor advisories and security bulletins for updates.

Timeline

Newly disclosed

Remediation

Users should change hardcoded credentials and implement stronger password policies. Regular security audits and updates should be performed to mitigate command injection risks.

Additional Information

This threat intelligence is aggregated from trusted cybersecurity sources. For the most up-to-date information, technical details, and official vendor guidance, please refer to the original article linked below.

Related Topics: This incident relates to Critical.

Related Coverage

Hackers compromise NGINX servers to redirect user traffic

BleepingComputer

Hackers are targeting NGINX servers in a campaign that reroutes user traffic through their own infrastructure. This attack compromises the servers, allowing the perpetrators to intercept and manipulate the data being transmitted. Affected users may experience altered content or be redirected to malicious sites without their knowledge. The incident raises concerns about the security of NGINX, a widely used web server software, and the potential for significant data breaches. Organizations using NGINX should take immediate precautions to safeguard their systems and ensure that their configurations are secure to prevent such hijacking.

Feb 4, 2026

Critical n8n flaws disclosed along with public exploits

BleepingComputer

Researchers have identified multiple serious vulnerabilities in n8n, a widely used open-source workflow automation platform. These flaws could enable attackers to escape the security measures of the software, potentially giving them complete control over the host server. This poses a significant risk to users, especially those running n8n in production environments. If exploited, these vulnerabilities could lead to unauthorized access and data breaches, impacting businesses that rely on n8n for automation tasks. Users are strongly advised to assess their systems and implement necessary security measures as soon as possible.

Feb 4, 2026

Taiwanese operator of Incognito Market sentenced to 30 years over $105M darknet drug ring

Security Affairs

Rui-Siang Lin, a 24-year-old Taiwanese man, has been sentenced to 30 years in prison for his role in operating Incognito Market, a significant darknet drug marketplace. This platform facilitated the sale of over one ton of illegal drugs, amounting to more than $105 million in transactions. Lin was found guilty of various charges, including conspiracy to distribute narcotics. The case illustrates the ongoing challenges law enforcement faces in combating illicit online drug trade and underscores the risks associated with the anonymity provided by darknet platforms. The long sentence reflects the severity of his actions and serves as a warning to others involved in similar activities.

Feb 4, 2026

Half of Chrome AI extensions are harvesting your data - see the surprising worst offenders

Latest news

Recent research reveals that nearly half of Chrome AI extensions are collecting user data without proper consent. Tools focused on coding, transcription, and productivity seem to be the worst offenders, raising significant privacy concerns for users. This issue could affect anyone using these extensions, as they often require extensive permissions to function. The findings suggest that many users may unknowingly expose their personal information to third parties through these seemingly helpful tools. As the use of AI technology grows, it’s crucial for users to be aware of what data they are sharing and how it might be used.

Feb 4, 2026

CISA: VMware ESXi flaw now exploited in ransomware attacks

BleepingComputer

CISA has reported that ransomware gangs are now exploiting a serious vulnerability in VMware ESXi, which allows attackers to escape sandboxes and gain unauthorized access to systems. This vulnerability, which had previously been used in zero-day attacks, poses a significant risk to organizations using affected VMware products. Companies relying on VMware ESXi for virtualization need to be particularly vigilant, as attackers are actively targeting this flaw. The exploitation of such vulnerabilities can lead to severe data breaches and financial losses. Organizations should prioritize patching their systems to mitigate this risk and protect sensitive data from potential ransomware attacks.

Feb 4, 2026

Global SystemBC Botnet Found Active Across 10,000 Infected Systems

Infosecurity Magazine

Researchers have identified the SystemBC malware, which is currently active across approximately 10,000 infected systems. This botnet is particularly concerning as it poses risks to sensitive government infrastructure, potentially exposing critical data and functionalities to malicious actors. The malware's widespread presence raises alarms about the security of various networks, especially those that manage important public services. Organizations, particularly in the public sector, need to take immediate action to secure their systems against this threat. Failure to address this could lead to significant operational disruptions and data breaches.

Feb 4, 2026