Kastle Systems’ access control system, which is widely used for securing commercial and government facilities, has been identified with critical vulnerabilities that could allow unauthorized access. These vulnerabilities involve the use of hard-coded credentials and the cleartext storage of sensitive information in system firmware versions prior to May 1, 2024. Attackers could exploit these flaws to gain access to sensitive data and bypass authentication mechanisms. These weaknesses pose a serious risk, particularly for facilities relying on Kastle’s system for security.
The vulnerabilities have been assigned CVEs, with CVE-2024-45861 related to hard-coded credentials and CVE-2024-45862 linked to the cleartext storage of sensitive machine credentials. Both vulnerabilities have high CVSS v4 scores, indicating a significant risk to systems using older firmware. If exploited, attackers could access sensitive information with minimal effort, putting both commercial and government sectors at risk. These vulnerabilities were reported to CISA by Adam Foster (evildaemond), highlighting the need for immediate action.
Kastle Systems has already addressed these vulnerabilities internally by fixing the system configuration flaws. Users are encouraged to update their systems to the latest firmware versions, though the cloud-based nature of the solution may complicate traditional mitigation strategies. As a precautionary measure, organizations are advised to perform proper risk assessments before implementing defensive measures. Although no public exploitation has been reported, CISA continues to monitor the situation and encourages proactive cybersecurity strategies.
For organizations using Kastle’s access control system, CISA recommends enhancing access control policies and applying the necessary updates to mitigate the risks. The vulnerabilities affect a broad range of facilities, and securing these systems is critical to preventing potential breaches. CISA also provides guidance on improving industrial control system cybersecurity, urging organizations to stay vigilant and report any suspicious activities to CISA for further analysis and action.
Reference: