Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-29916: n/a

0
Medium
VulnerabilityCVE-2024-29916cvecve-2024-29916
Published: Thu Mar 21 2024 (03/21/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

The dormakaba Saflok system before the November 2023 software update allows an attacker to unlock arbitrary doors at a property via forged keycards, if the attacker has obtained one active or expired keycard for the specific property, aka the "Unsaflok" issue. This occurs, in part, because the key derivation function relies only on a UID. This affects, for example, Saflok MT, and the Confidant, Quantum, RT, and Saffire series.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 22:30:38 UTC

Technical Analysis

The dormakaba Saflok system, widely used in hospitality and commercial properties, suffers from a cryptographic vulnerability identified as CVE-2024-29916. The root cause is the key derivation function's reliance solely on the UID (unique identifier) of a keycard, which is insufficiently secure. This design flaw allows an attacker who has obtained at least one active or expired keycard tied to a specific property to generate forged keycards capable of unlocking any door within that property. The affected product lines include Saflok MT, Confidant, Quantum, RT, and Saffire series electronic locks. The vulnerability does not require authentication but does require the attacker to have physical access to a valid or expired keycard, which can be obtained through theft, loss, or social engineering. The attack vector involves cloning or forging keycards by exploiting the weak key derivation process. The vulnerability was addressed in a software update released in November 2023, which presumably strengthens the key derivation mechanism or adds additional cryptographic safeguards. The CVSS v3.1 score is 5.6 (medium), reflecting the partial complexity of exploitation (physical access needed) and the significant impact on confidentiality and integrity, as unauthorized door access compromises physical security. No known exploits have been reported in the wild yet, but the potential for misuse in hospitality, corporate, and residential environments is substantial.

Potential Impact

The primary impact of CVE-2024-29916 is unauthorized physical access to secured areas, which can lead to theft, privacy violations, property damage, and potential harm to individuals. For organizations worldwide, especially those in the hospitality industry, commercial real estate, and residential complexes using dormakaba Saflok locks, this vulnerability undermines trust in physical security controls. Attackers can bypass door locks without detection if they can clone keycards, potentially gaining access to sensitive areas such as guest rooms, offices, or restricted facilities. This can result in loss of customer confidence, legal liabilities, and financial losses. Additionally, the breach of physical security can facilitate further cyber or physical attacks, such as data theft or sabotage. The medium CVSS score reflects that while exploitation requires some effort and physical access, the consequences of a successful attack are severe in terms of confidentiality and integrity of physical premises.

Mitigation Recommendations

Organizations should immediately verify that all dormakaba Saflok systems have been updated with the November 2023 software patch that addresses this vulnerability. If the update has not been applied, prioritize its deployment across all affected devices. Additionally, implement strict keycard management policies to reduce the risk of keycard loss or theft, including regular audits and rapid deactivation of lost or expired cards. Consider supplementing electronic locks with additional physical security measures such as surveillance cameras, security personnel, or secondary authentication methods (e.g., PIN codes or biometric verification) where feasible. Educate staff and residents about the risks of keycard sharing and the importance of reporting lost cards promptly. For high-security environments, evaluate alternative locking systems with stronger cryptographic protections. Regularly monitor access logs for suspicious activity that might indicate attempted unauthorized access. Finally, maintain close communication with dormakaba for any further security advisories or updates.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-03-21T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6da2b7ef31ef0b5899ce

Added to database: 2/25/2026, 9:46:10 PM

Last enriched: 2/26/2026, 10:30:38 PM

Last updated: 4/12/2026, 6:10:42 PM

Views: 13

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses