Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-58311: CWE-1245: Improper Finite State Machines (FSMs) in Hardware Logic in dormakaba Dormakaba Saflok System 6000

0
High
VulnerabilityCVE-2024-58311cvecve-2024-58311cwe-1245
Published: Fri Dec 12 2025 (12/12/2025, 19:57:03 UTC)
Source: CVE Database V5
Vendor/Project: dormakaba
Product: Dormakaba Saflok System 6000

Description

Dormakaba Saflok System 6000 contains a predictable key generation algorithm that allows attackers to derive card access keys from a 32-bit unique identifier. Attackers can exploit the deterministic key generation process by calculating valid access keys using a simple mathematical transformation of the card's unique identifier.

AI-Powered Analysis

AILast updated: 12/12/2025, 20:23:40 UTC

Technical Analysis

The vulnerability identified as CVE-2024-58311 affects the dormakaba Saflok System 6000, a widely used electronic access control system. The root cause is an improper finite state machine (FSM) implementation in the hardware logic, specifically a predictable key generation algorithm. This algorithm deterministically generates card access keys from a 32-bit unique identifier assigned to each card. Because the key generation is predictable and based on a simple mathematical transformation, an attacker who obtains or guesses the unique identifier can compute valid access keys without needing any privileged access or user interaction. This breaks the fundamental security assumption that card keys are secret and random. The vulnerability is classified under CWE-1245, which relates to improper FSM design leading to security weaknesses. The CVSS 4.0 vector indicates the attack can be performed remotely (AV:A - adjacent network), requires low attack complexity (AC:L), no privileges (PR:N), and no user interaction (UI:N). The impact on confidentiality, integrity, and availability is high (VC:H, VI:H, VA:H), as unauthorized access can compromise physical security, allow tampering, or denial of service by unauthorized entry. Although no exploits are currently reported in the wild, the deterministic nature of the key generation algorithm makes it straightforward to develop exploits. The affected product version is unspecified, suggesting all current versions may be vulnerable until patched. The vulnerability was published on December 12, 2025, indicating recent discovery. Dormakaba is a major global provider of access control solutions, and the Saflok System 6000 is deployed in various sectors including hospitality, corporate offices, and critical infrastructure.

Potential Impact

For European organizations, this vulnerability poses a significant risk to physical security controls. Unauthorized access to facilities protected by the Saflok System 6000 could lead to theft, espionage, sabotage, or safety incidents. Critical infrastructure facilities such as data centers, government buildings, and transportation hubs using these locks could be compromised, impacting operational continuity and regulatory compliance. The high impact on confidentiality, integrity, and availability means attackers could not only gain entry but also potentially manipulate access logs or disable locks. The ease of exploitation without authentication or user interaction increases the likelihood of attacks, especially in environments where attackers can access adjacent networks or obtain card identifiers. This vulnerability undermines trust in electronic access control systems and could lead to increased costs for incident response, physical security upgrades, and potential legal liabilities under European data protection and security regulations.

Mitigation Recommendations

Immediate mitigation should focus on physical and procedural controls: restrict network access to the Saflok System 6000 devices to trusted administrators only, implement enhanced monitoring and logging of access attempts, and conduct physical security audits to detect unauthorized entries. Organizations should engage with dormakaba to obtain firmware or hardware patches addressing the key generation flaw. If patches are unavailable, consider replacing vulnerable locks with alternative systems that use cryptographically secure key generation. Deploy multi-factor authentication for physical access where possible, such as combining card access with PIN codes or biometric verification. Educate security personnel about the vulnerability and signs of exploitation. Regularly review and update access control policies to minimize risk exposure. For high-security environments, consider additional physical barriers and intrusion detection systems as compensating controls until the vulnerability is fully remediated.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2025-12-11T11:49:20.720Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 693c7642a3f11564d0d3b88e

Added to database: 12/12/2025, 8:08:34 PM

Last enriched: 12/12/2025, 8:23:40 PM

Last updated: 12/14/2025, 10:02:26 PM

Views: 27

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats