CVE-2024-58337

4.3 MEDIUM

📋 TL;DR

The Akuvox Smart Intercom S539 has an improper access control vulnerability that allows users with 'User' privileges to modify API settings and configurations. This enables privilege escalation to administrative access. Organizations using the Akuvox Smart Intercom S539 are affected.

💻 Affected Systems

Products:
  • Akuvox Smart Intercom S539
Versions: All versions prior to patch
Operating Systems: Embedded Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Affects systems with default privilege configurations where 'User' accounts have access to API endpoints.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain full administrative control over the intercom system, potentially compromising building security systems, accessing video feeds, and manipulating access controls.

🟠

Likely Case

Unauthorized users escalate privileges to admin level, modify system configurations, and potentially disable security features.

🟢

If Mitigated

With proper network segmentation and access controls, impact is limited to the intercom system itself without lateral movement.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires valid user credentials but is straightforward once authenticated.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not available

Restart Required: No

Instructions:

1. Monitor Akuvox security advisories for patch availability. 2. Apply patch when released. 3. Verify privilege separation after patching.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate intercom systems from critical networks and limit access to authorized IPs only.

Access Control Review

all

Audit and restrict user privileges to minimum necessary access.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate intercom systems
  • Monitor API access logs for unauthorized configuration changes

🔍 How to Verify

Check if Vulnerable:

Test if a user account can access /services/http/api endpoints intended for administrators.

Check Version:

Check device web interface or console for firmware version

Verify Fix Applied:

Verify that user accounts can no longer modify API settings or configurations.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized API configuration changes from user accounts
  • Multiple privilege escalation attempts

Network Indicators:

  • Unusual API calls to administrative endpoints from non-admin IPs

SIEM Query:

source="akuvox_intercom" AND (event_type="config_change" OR api_endpoint="/services/http/api/*") AND user_role="user"

🔗 References

📤 Share & Export