CVE-2024-37654: n/a
CVE-2024-37654 is a medium severity vulnerability affecting multiple BAS-IP intercom and access control devices prior to version 3. 9. 2. It allows a remote attacker to obtain sensitive information by sending a crafted HTTP GET request. Exploitation requires no privileges but does require user interaction, such as triggering the request. The vulnerability impacts confidentiality significantly but has limited effect on integrity and no impact on availability. No known exploits are currently in the wild. The vulnerability is related to CWE-922, indicating improper restriction of operations within the HTTP request handling. Organizations using affected BAS-IP devices should prioritize updating to version 3. 9.
AI Analysis
Technical Summary
CVE-2024-37654 is a vulnerability identified in a broad range of BAS-IP intercom and access control devices, including models AV-01D through BA-12MD and CR-02BD, affecting firmware versions before 3.9.2. The flaw allows a remote attacker to extract sensitive information by crafting a specific HTTP GET request to the device's web interface or API endpoints. The vulnerability stems from improper access control or insufficient validation of HTTP requests (CWE-922), enabling unauthorized information disclosure. The CVSS 3.1 base score is 6.1, reflecting a medium severity level, with attack vector local (AV:L), low attack complexity (AC:L), no privileges required (PR:N), and user interaction required (UI:R). The scope is unchanged (S:U), with high confidentiality impact (C:H), low integrity impact (I:L), and no availability impact (A:N). This suggests that while the attacker cannot modify or disrupt device operation, they can gain access to sensitive data, potentially including configuration details, user credentials, or network information. No public exploits have been reported yet, but the vulnerability's presence in widely deployed BAS-IP devices used in physical security systems makes it a concern. The lack of a patch link indicates that users should verify firmware updates from the vendor and apply version 3.9.2 or later to remediate the issue.
Potential Impact
The primary impact of CVE-2024-37654 is unauthorized disclosure of sensitive information from BAS-IP intercom and access control devices. This can lead to exposure of configuration settings, user credentials, or network topology details, which attackers could leverage for further attacks such as lateral movement, privilege escalation, or physical security bypass. Organizations relying on these devices for building access control, visitor management, or security monitoring may face increased risk of targeted intrusions or espionage. Although the vulnerability does not directly affect device integrity or availability, the confidentiality breach can undermine trust in security controls and lead to compliance violations, especially in regulated industries. The requirement for user interaction and local network access somewhat limits remote exploitation, but insider threats or compromised internal hosts could exploit this vulnerability. The absence of known exploits reduces immediate risk but does not preclude future attacks. Overall, the vulnerability poses a moderate risk to organizations with BAS-IP deployments, particularly in sectors such as government, critical infrastructure, corporate campuses, and residential complexes.
Mitigation Recommendations
To mitigate CVE-2024-37654, organizations should immediately verify and apply firmware updates from BAS-IP, ensuring devices run version 3.9.2 or later where the vulnerability is addressed. Network segmentation should be enforced to isolate BAS-IP devices from untrusted networks and restrict access to management interfaces to authorized personnel only. Implement strict firewall rules to limit HTTP access to these devices, preferably allowing only trusted IP addresses. Employ network monitoring and intrusion detection systems to identify anomalous HTTP GET requests targeting BAS-IP devices. Disable or restrict remote management features if not required, and enforce strong authentication mechanisms for device access. Regularly audit device configurations and logs for signs of unauthorized access attempts. Additionally, educate staff about the risks of interacting with suspicious links or requests that could trigger exploitation. If vendor patches are delayed, consider temporary compensating controls such as web application firewalls with custom rules to block malicious request patterns targeting the vulnerability.
Affected Countries
United States, Germany, Russia, China, United Kingdom, France, Italy, South Korea, Japan, Canada, Australia, United Arab Emirates
CVE-2024-37654: n/a
Description
CVE-2024-37654 is a medium severity vulnerability affecting multiple BAS-IP intercom and access control devices prior to version 3. 9. 2. It allows a remote attacker to obtain sensitive information by sending a crafted HTTP GET request. Exploitation requires no privileges but does require user interaction, such as triggering the request. The vulnerability impacts confidentiality significantly but has limited effect on integrity and no impact on availability. No known exploits are currently in the wild. The vulnerability is related to CWE-922, indicating improper restriction of operations within the HTTP request handling. Organizations using affected BAS-IP devices should prioritize updating to version 3. 9.
AI-Powered Analysis
Technical Analysis
CVE-2024-37654 is a vulnerability identified in a broad range of BAS-IP intercom and access control devices, including models AV-01D through BA-12MD and CR-02BD, affecting firmware versions before 3.9.2. The flaw allows a remote attacker to extract sensitive information by crafting a specific HTTP GET request to the device's web interface or API endpoints. The vulnerability stems from improper access control or insufficient validation of HTTP requests (CWE-922), enabling unauthorized information disclosure. The CVSS 3.1 base score is 6.1, reflecting a medium severity level, with attack vector local (AV:L), low attack complexity (AC:L), no privileges required (PR:N), and user interaction required (UI:R). The scope is unchanged (S:U), with high confidentiality impact (C:H), low integrity impact (I:L), and no availability impact (A:N). This suggests that while the attacker cannot modify or disrupt device operation, they can gain access to sensitive data, potentially including configuration details, user credentials, or network information. No public exploits have been reported yet, but the vulnerability's presence in widely deployed BAS-IP devices used in physical security systems makes it a concern. The lack of a patch link indicates that users should verify firmware updates from the vendor and apply version 3.9.2 or later to remediate the issue.
Potential Impact
The primary impact of CVE-2024-37654 is unauthorized disclosure of sensitive information from BAS-IP intercom and access control devices. This can lead to exposure of configuration settings, user credentials, or network topology details, which attackers could leverage for further attacks such as lateral movement, privilege escalation, or physical security bypass. Organizations relying on these devices for building access control, visitor management, or security monitoring may face increased risk of targeted intrusions or espionage. Although the vulnerability does not directly affect device integrity or availability, the confidentiality breach can undermine trust in security controls and lead to compliance violations, especially in regulated industries. The requirement for user interaction and local network access somewhat limits remote exploitation, but insider threats or compromised internal hosts could exploit this vulnerability. The absence of known exploits reduces immediate risk but does not preclude future attacks. Overall, the vulnerability poses a moderate risk to organizations with BAS-IP deployments, particularly in sectors such as government, critical infrastructure, corporate campuses, and residential complexes.
Mitigation Recommendations
To mitigate CVE-2024-37654, organizations should immediately verify and apply firmware updates from BAS-IP, ensuring devices run version 3.9.2 or later where the vulnerability is addressed. Network segmentation should be enforced to isolate BAS-IP devices from untrusted networks and restrict access to management interfaces to authorized personnel only. Implement strict firewall rules to limit HTTP access to these devices, preferably allowing only trusted IP addresses. Employ network monitoring and intrusion detection systems to identify anomalous HTTP GET requests targeting BAS-IP devices. Disable or restrict remote management features if not required, and enforce strong authentication mechanisms for device access. Regularly audit device configurations and logs for signs of unauthorized access attempts. Additionally, educate staff about the risks of interacting with suspicious links or requests that could trigger exploitation. If vendor patches are delayed, consider temporary compensating controls such as web application firewalls with custom rules to block malicious request patterns targeting the vulnerability.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2024-06-10T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6c6ab7ef31ef0b563d74
Added to database: 2/25/2026, 9:40:58 PM
Last enriched: 2/26/2026, 5:17:05 AM
Last updated: 2/26/2026, 9:35:50 AM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-28138: Deserialization of Untrusted Data in Stylemix uListing
HighCVE-2026-28136: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in VeronaLabs WP SMS
HighCVE-2026-28132: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in villatheme WooCommerce Photo Reviews
HighCVE-2026-28131: Insertion of Sensitive Information Into Sent Data in WPVibes Elementor Addon Elements
HighCVE-2026-28083: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in UX-themes Flatsome
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.