Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-29149: n/a

0
High
VulnerabilityCVE-2024-29149cvecve-2024-29149
Published: Tue May 07 2024 (05/07/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

An issue was discovered in Alcatel-Lucent ALE NOE deskphones through 86x8_NOE-R300.1.40.12.4180 and SIP deskphones through 86x8_SIP-R200.1.01.10.728. Because of a time-of-check time-of-use vulnerability, an authenticated attacker is able to replace the verified firmware image with malicious firmware during the update process.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 17:41:15 UTC

Technical Analysis

CVE-2024-29149 is a vulnerability identified in Alcatel-Lucent ALE NOE deskphones (through firmware version 86x8_NOE-R300.1.40.12.4180) and SIP deskphones (through 86x8_SIP-R200.1.01.10.728). The issue is a time-of-check to time-of-use (TOCTOU) race condition during the firmware update process. Specifically, the device performs a verification check on the firmware image, but due to the TOCTOU flaw, an authenticated attacker with low privileges can replace the verified firmware image with a malicious one before it is installed. This allows the attacker to bypass firmware integrity checks and install arbitrary malicious firmware. The vulnerability requires the attacker to have authentication access to the device, but no further user interaction is necessary. The CVSS v3.1 base score is 7.4, reflecting high severity with impacts on confidentiality, integrity, and availability, and a scope change due to the potential for full device compromise. The vulnerability is categorized under CWE-367 (Time-of-check Time-of-use Race Condition). No public exploits or patches are currently available, increasing the urgency for organizations to implement interim mitigations. The affected devices are commonly used in enterprise telephony environments, making this a critical concern for organizations relying on Alcatel-Lucent deskphones for communication.

Potential Impact

The exploitation of CVE-2024-29149 can have severe consequences for organizations worldwide. By installing malicious firmware, attackers can gain persistent control over affected deskphones, enabling eavesdropping on calls, interception of sensitive communications, manipulation or disruption of telephony services, and potentially pivoting into broader enterprise networks. This compromises confidentiality, integrity, and availability of voice communications, which are often critical for business operations and security. The ability to replace firmware undermines trust in device authenticity and can facilitate advanced persistent threats (APTs). Organizations in sectors such as government, finance, healthcare, and critical infrastructure, which rely heavily on secure telephony, face heightened risks. Additionally, compromised devices could be used as entry points for lateral movement or as part of botnets for further attacks. The lack of known public exploits currently provides a window for proactive defense, but the vulnerability’s nature suggests it could be targeted in the near future.

Mitigation Recommendations

Until official patches are released, organizations should implement several specific mitigations: 1) Restrict and monitor access to the management interfaces of affected Alcatel-Lucent deskphones, ensuring only trusted administrators can authenticate. 2) Employ network segmentation to isolate telephony devices from general enterprise networks and limit exposure to potential attackers. 3) Implement strict firmware update policies, including verifying update sources and using out-of-band methods where possible. 4) Monitor network traffic and device logs for unusual firmware update attempts or unauthorized configuration changes. 5) Use multi-factor authentication for device management interfaces to reduce risk of credential compromise. 6) Engage with Alcatel-Lucent support channels to obtain early patch releases or guidance. 7) Consider temporary replacement or disabling of vulnerable devices in high-risk environments until patches are available. 8) Conduct regular security audits and penetration testing focused on telephony infrastructure to detect potential exploitation attempts. These measures go beyond generic advice by focusing on controlling the update process and access to vulnerable devices, which is critical given the TOCTOU nature of the vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-03-18T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6d9bb7ef31ef0b589389

Added to database: 2/25/2026, 9:46:03 PM

Last enriched: 2/26/2026, 5:41:15 PM

Last updated: 4/12/2026, 3:35:11 PM

Views: 12

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses