Thursday, April 10, 2025
Homecyber security49,000+ Access Management Systems Worldwide Exposed to Major Security Gaps

49,000+ Access Management Systems Worldwide Exposed to Major Security Gaps

Published on

SIEM as a Service

Follow Us on Google News

A recent study conducted by Dutch IT security consultancy Modat has revealed alarming vulnerabilities in over 49,000 access management systems (AMS) worldwide.

These systems, designed to control and secure access to buildings and sensitive areas, are reportedly plagued by misconfigurations that leave them exposed to cybercriminals.

The findings underscore a global issue affecting industries such as healthcare, government, education, manufacturing, and oil production.

- Advertisement - Google News

Misconfigurations Lead to Dual Threats

Access management systems authenticate users through methods like passwords, biometrics, or multi-factor authentication and regulate access rights based on predefined policies.

However, the study highlights two critical risks stemming from misconfigured AMS: unauthorized physical access to facilities and exposure of sensitive data.

The compromised systems reportedly allowed access to highly sensitive information, including employee names, identification numbers, biometric data, vehicle license plates, access card details, and even work schedules.

Particularly concerning is the exposure of biometric data in modern AMS platforms, which poses significant risks for identity theft, phishing attacks, and social engineering schemes.

Global Impact: Concentration in Key Regions

According to the Report, The study identifies Europe, the United States, the Middle East, and North Africa as regions with the highest concentration of vulnerable AMS.

Italy tops the list with 16,678 affected systems, followed by Mexico (5,940) and Vietnam (5,035).

India ranks 10th with approximately 1,070 cases. Notably absent from the top 10 is Germany.

Despite the widespread nature of these vulnerabilities, the report does not specify which manufacturers’ systems are most affected.

This lack of transparency raises questions about accountability and the need for urgent action by vendors and organizations using these systems.

Broader Implications for Cybersecurity

The exposure of such critical infrastructure highlights systemic weaknesses in cybersecurity practices across industries.

As AMS platforms increasingly integrate advanced technologies like biometrics and IoT connectivity, their attack surface expands significantly.

Experts warn that without immediate remediation efforts such as proper configuration protocols and regular security audits, these vulnerabilities could be exploited for large-scale breaches or targeted attacks.

Organizations are urged to prioritize securing their AMS platforms by implementing robust authentication measures and ensuring compliance with global cybersecurity standards.

This incident serves as a stark reminder of the importance of proactive security measures in safeguarding both physical and digital assets.

Are you from SOC/DFIR Teams? – Analyse Malware Incidents & get live Access with ANY.RUN -> Start Now for Free.

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Dell Alerts Users to Critical PowerScale OneFS Flaws Enabling Account Takeover

Dell Technologies has issued an urgent security advisory to its users, warning of several...

SonicWall Patches Multiple Vulnerabilities in NetExtender Windows Client

SonicWall has issued a critical alert concerning multiple vulnerabilities discovered in its NetExtender Windows...

Cable: Powerful Post-Exploitation Toolkit for Active Directory Attacks

Cybersecurity researchers are raising alarms about Cable, a potent open-source post-exploitation toolkit designed to exploit...

Langflow AI Builder Vulnerability Allows Remote Server Takeover by Attackers

A critical security vulnerability has been discovered in the Langflow AI Builder, a popular...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Dell Alerts Users to Critical PowerScale OneFS Flaws Enabling Account Takeover

Dell Technologies has issued an urgent security advisory to its users, warning of several...

SonicWall Patches Multiple Vulnerabilities in NetExtender Windows Client

SonicWall has issued a critical alert concerning multiple vulnerabilities discovered in its NetExtender Windows...

Cable: Powerful Post-Exploitation Toolkit for Active Directory Attacks

Cybersecurity researchers are raising alarms about Cable, a potent open-source post-exploitation toolkit designed to exploit...