Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-25734: n/a

0
High
VulnerabilityCVE-2024-25734cvecve-2024-25734
Published: Wed Mar 27 2024 (03/27/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

An issue was discovered on WyreStorm Apollo VX20 devices before 1.3.58. The TELNET service prompts for a password only after a valid username is entered, which might make it easier for remote attackers to enumerate user accounts.

AI-Powered Analysis

AILast updated: 11/04/2025, 18:55:41 UTC

Technical Analysis

CVE-2024-25734 is a vulnerability identified in WyreStorm Apollo VX20 devices running firmware versions before 1.3.58. The flaw resides in the TELNET service's authentication mechanism, where the system prompts for a password only after a valid username is entered. This behavior allows remote attackers to perform user enumeration by submitting usernames and observing whether a password prompt appears, thereby confirming valid accounts. The vulnerability is classified under CWE-200 (Information Exposure). The CVSS v3.1 base score is 7.5 (high), with vector AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N, indicating that the attack is network-based, requires no privileges or user interaction, and impacts confidentiality with high severity. While the vulnerability does not directly allow unauthorized access or code execution, the ability to enumerate valid usernames can facilitate further targeted attacks such as brute force password attempts or social engineering. No public exploits have been reported yet, but the exposure of valid account information significantly aids attackers in reconnaissance phases. The vulnerability affects the TELNET service, a protocol often considered insecure and deprecated, but still used in some AV and control systems like WyreStorm Apollo VX20. The lack of a patch link suggests that users should verify firmware versions and update to 1.3.58 or later where the issue is resolved.

Potential Impact

For European organizations, especially those deploying WyreStorm Apollo VX20 devices in audiovisual, conference, or control environments, this vulnerability poses a significant risk by enabling attackers to enumerate valid user accounts remotely. This information disclosure can lead to targeted brute force attacks or credential stuffing, potentially compromising device access and control systems. Although the vulnerability does not directly allow system compromise, it lowers the barrier for attackers to gain unauthorized access by revealing valid usernames. This can result in unauthorized control over AV infrastructure, disruption of services, or leakage of sensitive operational information. Given the criticality of AV systems in corporate, governmental, and educational institutions across Europe, exploitation could impact confidentiality and operational security. The vulnerability's network-based nature means attackers can exploit it remotely without authentication or user interaction, increasing the attack surface. The absence of known exploits in the wild currently reduces immediate risk but does not preclude future attacks, especially as threat actors often leverage user enumeration for initial access attempts.

Mitigation Recommendations

Organizations should immediately verify the firmware version of all WyreStorm Apollo VX20 devices and upgrade to version 1.3.58 or later where the vulnerability is fixed. If upgrading is not immediately possible, restrict TELNET access to trusted management networks using firewall rules or network segmentation to prevent unauthorized remote access. Disable TELNET service entirely if it is not required, replacing it with more secure management protocols such as SSH. Implement strong password policies and account lockout mechanisms to mitigate brute force attempts that may follow user enumeration. Monitor network traffic for unusual TELNET connection attempts and failed authentication events to detect potential reconnaissance activity. Conduct regular audits of device configurations and access logs to identify suspicious behavior. Educate IT and security teams about the risks of user enumeration and the importance of securing legacy protocols like TELNET in AV environments.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2024-02-11T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690a47616d939959c8022f0d

Added to database: 11/4/2025, 6:35:13 PM

Last enriched: 11/4/2025, 6:55:41 PM

Last updated: 12/20/2025, 5:18:43 PM

Views: 18

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats