Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-58337: Missing Authorization in The Akuvox Company Akuvox Smart Doorphone

0
High
VulnerabilityCVE-2024-58337cvecve-2024-58337
Published: Tue Dec 30 2025 (12/30/2025, 22:41:44 UTC)
Source: CVE Database V5
Vendor/Project: The Akuvox Company
Product: Akuvox Smart Doorphone

Description

Akuvox Smart Intercom S539 contains an improper access control vulnerability that allows users with 'User' privileges to modify API access settings and configurations. Attackers can exploit this vulnerability to escalate privileges and gain unauthorized access to administrative functionalities.

AI-Powered Analysis

AILast updated: 01/17/2026, 07:23:40 UTC

Technical Analysis

CVE-2024-58337 is an improper access control vulnerability found in Akuvox Smart Doorphone models S539, S532, X916, X915, and X912. The vulnerability arises because the device firmware does not properly enforce authorization checks on API access settings and configuration modifications. Specifically, users assigned the 'User' privilege level, which is typically limited, can exploit this flaw to alter API configurations that should be restricted to administrators. This unauthorized capability enables attackers to escalate their privileges to administrative levels, thereby gaining full control over the device's management functions. The vulnerability is remotely exploitable without requiring user interaction or elevated privileges initially, making it highly accessible to attackers with network access to the device. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N) reflects a network attack vector with low complexity, no attack prerequisites, and no user interaction, but requiring some privileges (User level). The impact on confidentiality, integrity, and availability is high since administrative control can lead to unauthorized data access, configuration manipulation, and potential denial of service. No public exploits have been reported yet, but the vulnerability's nature and severity warrant immediate attention. The lack of vendor patches at the time of publication increases the urgency for interim mitigations.

Potential Impact

For European organizations, this vulnerability poses a significant risk to physical security infrastructure, especially in sectors relying on smart intercoms and doorphones for controlled access, such as corporate offices, residential complexes, healthcare facilities, and government buildings. Unauthorized administrative access could allow attackers to bypass physical access controls, intercept or manipulate communication, or disrupt device availability, potentially leading to unauthorized entry or denial of service. The high CVSS score indicates a severe threat to confidentiality, integrity, and availability of the affected devices. Given the increasing adoption of IoT and smart building technologies across Europe, exploitation could have cascading effects on broader security systems. Additionally, compromised devices could serve as footholds for lateral movement within organizational networks. The absence of known exploits currently provides a window for proactive defense, but the risk of future exploitation remains high.

Mitigation Recommendations

1. Immediate network segmentation: Isolate Akuvox devices on dedicated VLANs or subnets with strict firewall rules to limit access only to trusted management stations. 2. Restrict user privileges: Audit and minimize the number of users assigned 'User' privileges on Akuvox devices, ensuring only necessary personnel have access. 3. Monitor API access logs: Implement continuous monitoring and alerting for unusual API configuration changes or privilege escalations. 4. Vendor engagement: Regularly check for firmware updates or security advisories from Akuvox and apply patches promptly once available. 5. Implement multi-factor authentication (MFA) where supported to add an additional layer of access control. 6. Conduct penetration testing and vulnerability assessments focusing on IoT and physical security devices to identify and remediate similar issues. 7. Employ network intrusion detection systems (NIDS) tuned to detect anomalous traffic patterns targeting these devices. 8. Develop incident response plans specifically addressing IoT device compromise scenarios.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2025-12-26T17:10:59.894Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6954592edb813ff03e385582

Added to database: 12/30/2025, 10:58:54 PM

Last enriched: 1/17/2026, 7:23:40 AM

Last updated: 2/7/2026, 12:23:56 AM

Views: 65

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats