CVE-2024-58311

9.8 CRITICAL

📋 TL;DR

The Dormakaba Saflok System 6000 uses a predictable key generation algorithm that allows attackers to derive valid card access keys from a 32-bit unique identifier. This enables unauthorized physical access to secured areas by creating cloned access cards. Organizations using this physical access control system are affected.

💻 Affected Systems

Products:
  • Dormakaba Saflok System 6000
Versions: All versions using the vulnerable key generation algorithm
Operating Systems: Embedded firmware on access control hardware
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability is inherent to the cryptographic design of the key generation algorithm and affects all deployments using this system.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete physical security compromise allowing attackers unrestricted access to all secured areas controlled by the system, potentially enabling theft, sabotage, or unauthorized entry to sensitive locations.

🟠

Likely Case

Attackers create cloned access cards to gain unauthorized entry to buildings, rooms, or secured areas, potentially leading to theft, espionage, or safety breaches.

🟢

If Mitigated

With proper monitoring and layered security controls, unauthorized access attempts can be detected and responded to before significant damage occurs.

🌐 Internet-Facing: LOW - This is primarily a physical security vulnerability affecting access control hardware, not typically internet-exposed systems.
🏢 Internal Only: HIGH - The vulnerability affects physical access control systems that protect internal facilities and secured areas.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires physical proximity to read card identifiers, but the key derivation itself is simple mathematical transformation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not applicable - requires hardware/firmware replacement

Vendor Advisory: https://www.dormakaba.com/

Restart Required: No

Instructions:

Contact Dormakaba for hardware replacement or firmware upgrade options. This vulnerability requires replacing the cryptographic algorithm implementation.

🔧 Temporary Workarounds

Enhanced Physical Monitoring

all

Increase physical security monitoring and implement additional access control layers

Card Rotation Policy

all

Implement frequent card replacement to limit window of opportunity for cloned cards

🧯 If You Can't Patch

  • Implement multi-factor authentication for sensitive areas (biometrics, PIN codes)
  • Deploy security personnel or surveillance systems to monitor access points

🔍 How to Verify

Check if Vulnerable:

Check if your organization uses Dormakaba Saflok System 6000 access control hardware

Check Version:

Contact Dormakaba support or check hardware documentation for system identification

Verify Fix Applied:

Verify with vendor that replacement hardware uses secure cryptographic key generation

📡 Detection & Monitoring

Log Indicators:

  • Multiple access attempts with different card IDs in short time
  • Access from previously unused card IDs
  • Access outside normal hours from new cards

Network Indicators:

  • Not applicable - primarily physical security system

SIEM Query:

Access control system logs showing card ID: (look for patterns of new card activations or unusual access patterns)

🔗 References

📤 Share & Export