{"id": "CVE-2024-58337", "cveTags": [], "metrics": {"cvssMetricV31": [{"type": "Primary", "source": "disclosure@vulncheck.com", "cvssData": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 4.3, "attackVector": "NETWORK", "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", "integrityImpact": "LOW", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "NONE", "privilegesRequired": "LOW", "confidentialityImpact": "NONE"}, "impactScore": 1.4, "exploitabilityScore": 2.8}, {"type": "Secondary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 4.3, "attackVector": "NETWORK", "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", "integrityImpact": "LOW", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "NONE", "privilegesRequired": "LOW", "confidentialityImpact": "NONE"}, "impactScore": 1.4, "exploitabilityScore": 2.8}], "cvssMetricV40": [{"type": "Secondary", "source": "disclosure@vulncheck.com", "cvssData": {"Safety": "NOT_DEFINED", "version": "4.0", "Recovery": "NOT_DEFINED", "baseScore": 8.7, "Automatable": "NOT_DEFINED", "attackVector": "NETWORK", "baseSeverity": "HIGH", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "exploitMaturity": "NOT_DEFINED", "providerUrgency": "NOT_DEFINED", "userInteraction": "NONE", "attackComplexity": "LOW", "attackRequirements": "NONE", "privilegesRequired": "LOW", "subIntegrityImpact": "NONE", "vulnIntegrityImpact": "HIGH", "integrityRequirement": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "vulnAvailabilityImpact": "HIGH", "availabilityRequirement": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "subConfidentialityImpact": "NONE", "vulnConfidentialityImpact": "HIGH", "confidentialityRequirement": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubIntegrityImpact": "NOT_DEFINED", "modifiedVulnIntegrityImpact": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", "modifiedSubAvailabilityImpact": "NOT_DEFINED", "modifiedVulnAvailabilityImpact": "NOT_DEFINED", "modifiedSubConfidentialityImpact": "NOT_DEFINED", "modifiedVulnConfidentialityImpact": "NOT_DEFINED"}}]}, "published": "2025-12-30T23:15:49.060", "references": [{"url": "https://cxsecurity.com/issue/WLB-2024110042", "tags": ["Third Party Advisory"], "source": "disclosure@vulncheck.com"}, {"url": "https://packetstormsecurity.com/files/182870/", "tags": ["Broken Link"], "source": "disclosure@vulncheck.com"}, {"url": "https://www.vulncheck.com/advisories/akuvox-smart-intercom-s-improper-access-control-via-serviceshttpapi", "tags": ["Third Party Advisory"], "source": "disclosure@vulncheck.com"}, {"url": "https://www.zeroscience.mk/en/vulnerabilities/ZSL-2024-5862.php", "tags": ["Third Party Advisory"], "source": "disclosure@vulncheck.com"}, {"url": "https://www.zeroscience.mk/en/vulnerabilities/ZSL-2024-5862.php", "tags": ["Third Party Advisory"], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Secondary", "source": "disclosure@vulncheck.com", "description": [{"lang": "en", "value": "CWE-862"}]}], "descriptions": [{"lang": "en", "value": "Akuvox Smart Intercom S539 contains an improper access control vulnerability that allows users with 'User' privileges to modify API access settings and configurations. Attackers can exploit this vulnerability to escalate privileges and gain unauthorized access to administrative functionalities."}], "lastModified": "2026-01-16T19:16:15.843", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:akuvox:s539_firmware:912.30.1.137:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4B93FB44-0535-41BC-BF4C-2D8F0C3FE85D"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:akuvox:s539:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "675AF904-EEDF-4BED-A22E-A1861DD9914F"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:akuvox:s532_firmware:912.30.1.137:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0FAC3868-AEFE-4D6A-9B46-E5D1C2EB71D8"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:akuvox:s532:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "84E3746E-8A88-4859-B1AC-2EED52F5BAD2"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:akuvox:x916_firmware:912.30.1.137:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F0FBA49A-8092-4FCD-88CC-94112DEE5B60"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:akuvox:x916:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "9DAFEA0C-F8CF-4F1D-8088-6F964806C6EB"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:akuvox:x915_firmware:912.30.1.137:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1757ADA6-F7AB-4D45-96BC-FE57026AB657"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:akuvox:x915:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "F2AF26BB-C4BC-4545-92B8-3B9B95764476"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:akuvox:x912_firmware:912.30.1.137:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F86BCBD1-CF43-48EC-8C4B-AB979E5E8768"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:akuvox:x912:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "7AB133A3-D540-4F2F-8B13-1E22C5E0E3AA"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:akuvox:r29_firmware:912.30.1.137:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0006AED3-ED18-47A4-B958-04CBFFC25499"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:akuvox:r29:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "938BF758-03AE-41C3-9C96-57046116D574"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:akuvox:e16c_firmware:912.30.1.137:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0CD71B95-BE12-44E3-94C0-58B7535375CB"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:akuvox:e16c:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "D923673D-2EA6-494F-A490-86653B90A5C6"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:akuvox:r20k-2_firmware:912.30.1.137:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "352066CD-300D-4374-900F-A5ED571F7FA1"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:akuvox:r20k-2:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "57AA1254-009A-454E-B5E7-9624D5342360"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:akuvox:r20a-2_firmware:912.30.1.137:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1264C5AE-658F-4403-AEFC-D173713DD42A"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:akuvox:r20a-2:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "8D81E42E-BF72-4D3E-BF5C-3ACFE0D8B89C"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:akuvox:c313w-2_firmware:912.30.1.137:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7B9C0606-EFDE-4C00-9EE8-4E08957A3309"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:akuvox:c313w-2:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "CFCB3FB9-ECA5-45CF-B87B-64784EF01327"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:akuvox:ns-2_firmware:912.30.1.137:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AAAE1054-9DFB-41CC-BDA0-EA20FB02AE3C"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:akuvox:ns-2:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "860C90D8-61DD-4692-8793-2A9AFC91CFBB"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:akuvox:nc-2_firmware:912.30.1.137:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "92992790-5B86-41D1-BB19-09705C5FBEDD"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:akuvox:nc-2:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "07F48379-47CE-498A-A930-009A8FE752ED"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:akuvox:nx-2_firmware:912.30.1.137:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DA09C720-D7A0-4966-81AC-DA279B69B5D5"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:akuvox:nx-2:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "C2C9FB0D-D5A7-455A-8C79-88A1C4889037"}], "operator": "OR"}], "operator": "AND"}], "sourceIdentifier": "disclosure@vulncheck.com"}