Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-37654: n/a

0
Medium
VulnerabilityCVE-2024-37654cvecve-2024-37654
Published: Fri Jun 21 2024 (06/21/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2024-37654 is a medium severity vulnerability affecting multiple BAS-IP intercom and access control devices prior to version 3. 9. 2. It allows a remote attacker to obtain sensitive information by sending a crafted HTTP GET request. Exploitation requires no privileges but does require user interaction, such as triggering the request. The vulnerability impacts confidentiality significantly but has limited effect on integrity and no impact on availability. No known exploits are currently in the wild. The vulnerability is related to CWE-922, indicating improper restriction of operations within the HTTP request handling. Organizations using affected BAS-IP devices should prioritize updating to version 3. 9.

AI-Powered Analysis

AILast updated: 02/26/2026, 05:17:05 UTC

Technical Analysis

CVE-2024-37654 is a vulnerability identified in a broad range of BAS-IP intercom and access control devices, including models AV-01D through BA-12MD and CR-02BD, affecting firmware versions before 3.9.2. The flaw allows a remote attacker to extract sensitive information by crafting a specific HTTP GET request to the device's web interface or API endpoints. The vulnerability stems from improper access control or insufficient validation of HTTP requests (CWE-922), enabling unauthorized information disclosure. The CVSS 3.1 base score is 6.1, reflecting a medium severity level, with attack vector local (AV:L), low attack complexity (AC:L), no privileges required (PR:N), and user interaction required (UI:R). The scope is unchanged (S:U), with high confidentiality impact (C:H), low integrity impact (I:L), and no availability impact (A:N). This suggests that while the attacker cannot modify or disrupt device operation, they can gain access to sensitive data, potentially including configuration details, user credentials, or network information. No public exploits have been reported yet, but the vulnerability's presence in widely deployed BAS-IP devices used in physical security systems makes it a concern. The lack of a patch link indicates that users should verify firmware updates from the vendor and apply version 3.9.2 or later to remediate the issue.

Potential Impact

The primary impact of CVE-2024-37654 is unauthorized disclosure of sensitive information from BAS-IP intercom and access control devices. This can lead to exposure of configuration settings, user credentials, or network topology details, which attackers could leverage for further attacks such as lateral movement, privilege escalation, or physical security bypass. Organizations relying on these devices for building access control, visitor management, or security monitoring may face increased risk of targeted intrusions or espionage. Although the vulnerability does not directly affect device integrity or availability, the confidentiality breach can undermine trust in security controls and lead to compliance violations, especially in regulated industries. The requirement for user interaction and local network access somewhat limits remote exploitation, but insider threats or compromised internal hosts could exploit this vulnerability. The absence of known exploits reduces immediate risk but does not preclude future attacks. Overall, the vulnerability poses a moderate risk to organizations with BAS-IP deployments, particularly in sectors such as government, critical infrastructure, corporate campuses, and residential complexes.

Mitigation Recommendations

To mitigate CVE-2024-37654, organizations should immediately verify and apply firmware updates from BAS-IP, ensuring devices run version 3.9.2 or later where the vulnerability is addressed. Network segmentation should be enforced to isolate BAS-IP devices from untrusted networks and restrict access to management interfaces to authorized personnel only. Implement strict firewall rules to limit HTTP access to these devices, preferably allowing only trusted IP addresses. Employ network monitoring and intrusion detection systems to identify anomalous HTTP GET requests targeting BAS-IP devices. Disable or restrict remote management features if not required, and enforce strong authentication mechanisms for device access. Regularly audit device configurations and logs for signs of unauthorized access attempts. Additionally, educate staff about the risks of interacting with suspicious links or requests that could trigger exploitation. If vendor patches are delayed, consider temporary compensating controls such as web application firewalls with custom rules to block malicious request patterns targeting the vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-06-10T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c6ab7ef31ef0b563d74

Added to database: 2/25/2026, 9:40:58 PM

Last enriched: 2/26/2026, 5:17:05 AM

Last updated: 2/26/2026, 9:35:50 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats