CVE-2024-48939

7.5 HIGH

📋 TL;DR

Paxton Net2 versions before 6.07.14023.5015 (SR4) have insufficient validation of REST API license files, allowing attackers to use the API with invalid licenses. This enables unauthorized access to access-log data. Organizations using vulnerable Paxton Net2 access control systems are affected.

💻 Affected Systems

Products:
  • Paxton Net2
Versions: All versions before 6.07.14023.5015 (SR4)
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Systems using the REST API feature with license validation are vulnerable.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could retrieve sensitive access-log data including personnel movements, door access patterns, and security event logs, potentially enabling physical security breaches or intelligence gathering.

🟠

Likely Case

Unauthorized access to access-log data revealing building entry/exit patterns, employee movements, and security system activity.

🟢

If Mitigated

Limited or no data exposure if proper network segmentation and API access controls are implemented.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires network access to the REST API endpoint but bypasses license validation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 6.07.14023.5015 (SR4) or later

Vendor Advisory: https://paxton-access.co.uk

Restart Required: Yes

Instructions:

1. Download the latest Net2 software from Paxton's official website. 2. Backup current configuration and database. 3. Run the installer to upgrade to version 6.07.14023.5015 or later. 4. Restart the Net2 server and verify functionality.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict network access to Net2 REST API endpoints

Disable REST API

windows

Temporarily disable the REST API feature if not required

🧯 If You Can't Patch

  • Implement strict network access controls to limit REST API access to authorized IPs only
  • Monitor REST API logs for unusual access patterns or license validation failures

🔍 How to Verify

Check if Vulnerable:

Check Net2 version in the software interface or via the REST API endpoint /api/version

Check Version:

curl -X GET http://[net2-server]/api/version

Verify Fix Applied:

Confirm version is 6.07.14023.5015 or later and test license validation with invalid license files

📡 Detection & Monitoring

Log Indicators:

  • Failed license validation attempts
  • Unauthorized REST API access to access-log endpoints
  • Multiple requests to /api/access-logs from unusual sources

Network Indicators:

  • Unusual traffic to Net2 REST API endpoints (typically port 80/443)
  • Requests to access-log endpoints without proper authentication

SIEM Query:

source="net2" AND (uri_path="/api/access-logs" OR message="license validation")

🔗 References

📤 Share & Export