Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-30656: n/a

0
Medium
VulnerabilityCVE-2024-30656cvecve-2024-30656
Published: Mon Apr 15 2024 (04/15/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

An issue in Fireboltt Dream Wristphone BSW202_FB_AAC_v2.0_20240110-20240110-1956 allows attackers to cause a Denial of Service (DoS) via a crafted deauth frame.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 17:28:47 UTC

Technical Analysis

CVE-2024-30656 is a vulnerability identified in the Fireboltt Dream Wristphone, specifically the BSW202_FB_AAC_v2.0_20240110-20240110-1956 firmware version. The issue arises from the device's handling of deauthentication frames, which are part of the Wi-Fi protocol used to disconnect clients from access points. An attacker can craft and send malicious deauth frames to the wristphone, causing it to enter a Denial of Service state. This disrupts the device's wireless connectivity, effectively rendering it unusable until reboot or recovery. The attack vector is local, requiring the attacker to be within wireless range of the device. No authentication or user interaction is required, making the attack relatively straightforward for a nearby adversary. The CVSS v3.1 base score is 5.1, reflecting a medium severity with no impact on confidentiality but partial impact on integrity and availability. No patches or mitigations have been officially released at the time of publication, and no exploits have been observed in the wild. This vulnerability highlights the risks associated with wireless protocol manipulation in IoT and wearable devices, which often have limited security controls and recovery options.

Potential Impact

The primary impact of CVE-2024-30656 is the disruption of device availability through a Denial of Service attack. For individual users, this can mean loss of critical wristphone functionality such as notifications, health monitoring, or communication features. For organizations deploying these devices in operational environments, such as workforce wearables or health monitoring, the DoS could interrupt workflows or safety monitoring. The integrity of the device's wireless connection is also compromised, potentially leading to repeated disconnections or instability. Since the attack requires local wireless proximity, the scope is limited to environments where attackers can physically approach the device. There is no direct impact on data confidentiality, but service disruption can degrade user trust and operational reliability. The absence of known exploits reduces immediate risk, but the medium severity score suggests that motivated attackers could leverage this vulnerability in targeted scenarios.

Mitigation Recommendations

To mitigate CVE-2024-30656, organizations and users should first monitor Fireboltt's official channels for firmware updates or patches addressing this vulnerability. Until a patch is available, limiting physical and wireless access to the wristphone is critical. Deploy wireless intrusion detection systems (WIDS) to monitor for suspicious deauthentication frames in environments where these devices are used. Network segmentation can isolate wristphone traffic to reduce exposure. Employing Wi-Fi Protected Access (WPA3) where supported may help, although this vulnerability exploits deauth frames which are part of the protocol itself. Educate users to recognize signs of device instability or connectivity issues that may indicate an attack. For high-security environments, consider alternative devices with stronger wireless security or additional protective controls. Finally, maintain incident response plans that include IoT and wearable device disruptions to ensure rapid recovery.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-03-27T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6dc5b7ef31ef0b58df9a

Added to database: 2/25/2026, 9:46:45 PM

Last enriched: 2/26/2026, 5:28:47 PM

Last updated: 4/12/2026, 3:42:06 PM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses