CVE-2024-45837

5.4 MEDIUM

📋 TL;DR

This vulnerability involves hard-coded cryptographic keys in AIPHONE intercom systems and software, allowing network-adjacent attackers to access SFTP services without authentication. Attackers can view, download, or modify files they shouldn't have access to. Affected systems include AIPHONE IX SYSTEM, IXG SYSTEM, and System Support Software.

💻 Affected Systems

Products:
  • AIPHONE IX SYSTEM
  • AIPHONE IXG SYSTEM
  • System Support Software
Versions: All versions prior to fixes
Operating Systems: Embedded systems in AIPHONE hardware
Default Config Vulnerable: ⚠️ Yes
Notes: Systems with SFTP service enabled and accessible from the network are vulnerable. The vulnerability requires network adjacency.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of system files including configuration, logs, and potentially sensitive data; unauthorized modifications could disrupt operations or enable further attacks.

🟠

Likely Case

Unauthorized file access and exfiltration of configuration data, logs, or other files accessible via SFTP.

🟢

If Mitigated

Limited impact if SFTP service is disabled or network access is restricted, though the vulnerability remains present.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires network access to the SFTP service and knowledge of the hard-coded credentials. No authentication is needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisories for specific version updates

Vendor Advisory: https://www.aiphone.net/important/20241016_1/

Restart Required: Yes

Instructions:

1. Review vendor advisories at provided URLs. 2. Download updated firmware/software from AIPHONE support site. 3. Apply updates following vendor instructions. 4. Restart affected systems.

🔧 Temporary Workarounds

Disable SFTP Service

all

Turn off SFTP service if not required for operations

Network Segmentation

all

Restrict network access to SFTP service using firewalls or VLANs

🧯 If You Can't Patch

  • Implement strict network access controls to limit who can reach the SFTP service
  • Monitor SFTP access logs for unauthorized connection attempts

🔍 How to Verify

Check if Vulnerable:

Check if SFTP service is accessible from network and test with known hard-coded credentials (not disclosed here for security)

Check Version:

Check system firmware/software version through device management interface

Verify Fix Applied:

Verify updated version is installed and test that SFTP no longer accepts hard-coded credentials

📡 Detection & Monitoring

Log Indicators:

  • Unusual SFTP login attempts
  • SFTP access from unexpected IP addresses
  • File access patterns outside normal operations

Network Indicators:

  • SFTP connections from unauthorized network segments
  • Unusual file transfer volumes via SFTP

SIEM Query:

source="sftp_logs" AND (event="authentication" AND result="success") | stats count by src_ip

🔗 References

📤 Share & Export