CVE-2024-58337: Missing Authorization in The Akuvox Company Akuvox Smart Doorphone
Akuvox Smart Intercom S539 contains an improper access control vulnerability that allows users with 'User' privileges to modify API access settings and configurations. Attackers can exploit this vulnerability to escalate privileges and gain unauthorized access to administrative functionalities.
AI Analysis
Technical Summary
CVE-2024-58337 is an improper access control vulnerability identified in several Akuvox Smart Doorphone models (S539, S532, X916, X915, X912). The vulnerability arises because the device firmware does not enforce adequate authorization checks on API access settings and configurations. Specifically, users assigned 'User' privileges, which are typically limited, can exploit this flaw to modify API configurations that should be restricted to administrators. This lack of authorization validation allows privilege escalation, granting attackers unauthorized administrative access to the device's management functions. The vulnerability is remotely exploitable over the network (AV:N), requires low attack complexity (AC:L), and does not require user interaction (UI:N) or additional authentication beyond user-level access (PR:L). The impact on confidentiality, integrity, and availability is high (VC:H, VI:H, VA:H), as attackers can manipulate device settings, potentially disabling security features or gaining persistent control. The vulnerability affects multiple widely deployed Akuvox models used in smart intercom and doorphone systems, which are often integrated into building security and access control infrastructures. Although no known exploits have been reported in the wild, the high CVSS score (8.7) and the nature of the vulnerability make it a significant threat, especially in environments where these devices control physical access. The vulnerability was published on December 30, 2025, with no patches currently linked, emphasizing the need for urgent vendor response and mitigation by users.
Potential Impact
For European organizations, the impact of CVE-2024-58337 is substantial due to the critical role smart doorphones play in physical security and access control. Unauthorized administrative access could allow attackers to manipulate entry permissions, disable security alerts, or create backdoors into corporate or residential buildings. This can lead to physical security breaches, theft, espionage, or sabotage. Organizations in sectors such as finance, government, healthcare, and critical infrastructure are particularly vulnerable, as these sectors rely heavily on secure access control systems. Additionally, the compromise of these devices could serve as a pivot point for further network intrusion, as smart doorphones often connect to internal networks. The high severity and ease of exploitation increase the likelihood of targeted attacks, especially in environments where user accounts with 'User' privileges are common and not tightly controlled. The absence of known exploits in the wild currently limits immediate widespread impact but does not reduce the urgency for mitigation, as attackers may develop exploits rapidly once the vulnerability is public.
Mitigation Recommendations
European organizations should immediately audit their Akuvox Smart Doorphone deployments to identify affected models (S539, S532, X916, X915, X912). Until official patches are released, organizations should implement strict network segmentation to isolate these devices from critical internal networks, limiting exposure to potential attackers. Access controls should be reviewed and tightened to minimize the number of users with 'User' privileges, and strong authentication mechanisms should be enforced for all device access. Monitoring and logging of API access and configuration changes should be enabled to detect suspicious activities promptly. If possible, disable remote management features or restrict them to trusted IP addresses. Organizations should engage with Akuvox for patch timelines and apply updates immediately upon release. Additionally, consider deploying compensating controls such as network intrusion detection systems (NIDS) to identify anomalous traffic patterns targeting these devices. Physical security policies should be reinforced to mitigate risks from compromised devices. Finally, staff training on the risks associated with IoT and smart devices should be enhanced to raise awareness.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Belgium, Sweden, Poland, Switzerland
CVE-2024-58337: Missing Authorization in The Akuvox Company Akuvox Smart Doorphone
Description
Akuvox Smart Intercom S539 contains an improper access control vulnerability that allows users with 'User' privileges to modify API access settings and configurations. Attackers can exploit this vulnerability to escalate privileges and gain unauthorized access to administrative functionalities.
AI-Powered Analysis
Technical Analysis
CVE-2024-58337 is an improper access control vulnerability identified in several Akuvox Smart Doorphone models (S539, S532, X916, X915, X912). The vulnerability arises because the device firmware does not enforce adequate authorization checks on API access settings and configurations. Specifically, users assigned 'User' privileges, which are typically limited, can exploit this flaw to modify API configurations that should be restricted to administrators. This lack of authorization validation allows privilege escalation, granting attackers unauthorized administrative access to the device's management functions. The vulnerability is remotely exploitable over the network (AV:N), requires low attack complexity (AC:L), and does not require user interaction (UI:N) or additional authentication beyond user-level access (PR:L). The impact on confidentiality, integrity, and availability is high (VC:H, VI:H, VA:H), as attackers can manipulate device settings, potentially disabling security features or gaining persistent control. The vulnerability affects multiple widely deployed Akuvox models used in smart intercom and doorphone systems, which are often integrated into building security and access control infrastructures. Although no known exploits have been reported in the wild, the high CVSS score (8.7) and the nature of the vulnerability make it a significant threat, especially in environments where these devices control physical access. The vulnerability was published on December 30, 2025, with no patches currently linked, emphasizing the need for urgent vendor response and mitigation by users.
Potential Impact
For European organizations, the impact of CVE-2024-58337 is substantial due to the critical role smart doorphones play in physical security and access control. Unauthorized administrative access could allow attackers to manipulate entry permissions, disable security alerts, or create backdoors into corporate or residential buildings. This can lead to physical security breaches, theft, espionage, or sabotage. Organizations in sectors such as finance, government, healthcare, and critical infrastructure are particularly vulnerable, as these sectors rely heavily on secure access control systems. Additionally, the compromise of these devices could serve as a pivot point for further network intrusion, as smart doorphones often connect to internal networks. The high severity and ease of exploitation increase the likelihood of targeted attacks, especially in environments where user accounts with 'User' privileges are common and not tightly controlled. The absence of known exploits in the wild currently limits immediate widespread impact but does not reduce the urgency for mitigation, as attackers may develop exploits rapidly once the vulnerability is public.
Mitigation Recommendations
European organizations should immediately audit their Akuvox Smart Doorphone deployments to identify affected models (S539, S532, X916, X915, X912). Until official patches are released, organizations should implement strict network segmentation to isolate these devices from critical internal networks, limiting exposure to potential attackers. Access controls should be reviewed and tightened to minimize the number of users with 'User' privileges, and strong authentication mechanisms should be enforced for all device access. Monitoring and logging of API access and configuration changes should be enabled to detect suspicious activities promptly. If possible, disable remote management features or restrict them to trusted IP addresses. Organizations should engage with Akuvox for patch timelines and apply updates immediately upon release. Additionally, consider deploying compensating controls such as network intrusion detection systems (NIDS) to identify anomalous traffic patterns targeting these devices. Physical security policies should be reinforced to mitigate risks from compromised devices. Finally, staff training on the risks associated with IoT and smart devices should be enhanced to raise awareness.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulnCheck
- Date Reserved
- 2025-12-26T17:10:59.894Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6954592edb813ff03e385582
Added to database: 12/30/2025, 10:58:54 PM
Last enriched: 1/7/2026, 12:26:33 AM
Last updated: 1/8/2026, 7:21:28 AM
Views: 46
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-0700: SQL Injection in code-projects Intern Membership Management System
MediumCVE-2025-13679: CWE-862 Missing Authorization in themeum Tutor LMS – eLearning and online course solution
MediumCVE-2026-0699: SQL Injection in code-projects Intern Membership Management System
MediumCVE-2026-0698: SQL Injection in code-projects Intern Membership Management System
MediumCVE-2026-0697: SQL Injection in code-projects Intern Membership Management System
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.