Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-25736: n/a

0
High
VulnerabilityCVE-2024-25736cvecve-2024-25736
Published: Wed Mar 27 2024 (03/27/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

An issue was discovered on WyreStorm Apollo VX20 devices before 1.3.58. Remote attackers can restart the device via a /device/reboot GET request.

AI-Powered Analysis

AILast updated: 11/04/2025, 18:55:12 UTC

Technical Analysis

CVE-2024-25736 is a vulnerability identified in WyreStorm Apollo VX20 devices running firmware versions prior to 1.3.58. The flaw allows remote attackers to trigger a device reboot by issuing an unauthenticated HTTP GET request to the /device/reboot endpoint. This endpoint lacks proper access controls, classified under CWE-284 (Improper Access Control), enabling attackers to cause a denial of service (DoS) by forcing the device to restart unexpectedly. The vulnerability has a CVSS 3.1 base score of 7.5, reflecting its high severity due to network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), no confidentiality or integrity impact (C:N, I:N), but high impact on availability (A:H). The device reboot disrupts the normal operation of the AV or control systems managed by the Apollo VX20, potentially affecting business continuity. No patches or exploit code are currently publicly available, but the vendor is expected to release firmware updates addressing this issue. The vulnerability is particularly concerning for environments where continuous device uptime is critical, such as corporate meeting rooms, control centers, or broadcast facilities.

Potential Impact

For European organizations, the primary impact of CVE-2024-25736 is the potential for denial of service through forced device reboots. This can interrupt audiovisual presentations, control systems, or other integrated services relying on the WyreStorm Apollo VX20, leading to operational downtime and productivity loss. While the vulnerability does not compromise data confidentiality or integrity, the availability impact can be significant in environments requiring high reliability. Organizations in sectors such as government, finance, education, and large enterprises that use these devices for critical communications or control may experience disruptions. Additionally, repeated exploitation could be used as a nuisance or part of a larger attack campaign to degrade organizational capabilities. The lack of authentication requirement and ease of exploitation increase the risk, especially if devices are exposed to untrusted networks or insufficiently segmented internal networks.

Mitigation Recommendations

To mitigate CVE-2024-25736, organizations should prioritize updating WyreStorm Apollo VX20 devices to firmware version 1.3.58 or later once the vendor releases the patch. Until then, network-level controls should be implemented to restrict access to the device management interface, especially blocking inbound traffic to the /device/reboot endpoint from untrusted sources. Deploy network segmentation to isolate AV control devices from general user networks and the internet. Employ firewall rules or access control lists (ACLs) to limit which hosts can communicate with these devices. Monitor network traffic for suspicious GET requests targeting the reboot endpoint and establish alerting mechanisms. Additionally, consider physical security controls to prevent unauthorized local access. Regularly review device configurations and logs to detect any unauthorized reboot attempts. Engage with WyreStorm support for guidance and timely updates.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2024-02-11T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690a47616d939959c8022f18

Added to database: 11/4/2025, 6:35:13 PM

Last enriched: 11/4/2025, 6:55:12 PM

Last updated: 11/5/2025, 11:18:36 AM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats