Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-36440: n/a

0
Medium
VulnerabilityCVE-2024-36440cvecve-2024-36440
Published: Thu Aug 22 2024 (08/22/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

An issue was discovered on Swissphone DiCal-RED 4009 devices. An attacker with access to the file /etc/deviceconfig may recover the administrative device password via password-cracking methods, because unsalted MD5 is used.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 03:24:41 UTC

Technical Analysis

CVE-2024-36440 identifies a vulnerability in Swissphone DiCal-RED 4009 devices related to insecure password storage. The administrative device password is stored in the /etc/deviceconfig file using an unsalted MD5 hash. MD5 is a cryptographic hash function known to be vulnerable to collision and preimage attacks, and the lack of salting further weakens the password protection, enabling attackers to perform efficient offline password cracking. An attacker who can access this configuration file—either through local access or potentially via network vectors that expose the file—can recover the administrative password, thereby gaining elevated privileges on the device. This compromises both confidentiality and integrity, as the attacker could manipulate device settings or intercept sensitive communications. The vulnerability does not require prior authentication or user interaction but does require high attack complexity due to the need to access the configuration file. No patches or mitigations have been officially released yet, and no known exploits have been reported in the wild. The vulnerability is categorized under CWE-1393 (Use of Password Hash With Insufficient Computational Effort), CWE-327 (Use of a Broken or Risky Cryptographic Algorithm), and CWE-759 (Use of a One-Way Hash Without a Salt).

Potential Impact

The primary impact of this vulnerability is the potential compromise of administrative credentials, which can lead to unauthorized configuration changes, interception or manipulation of communications, and disruption of device operations. Organizations relying on Swissphone DiCal-RED 4009 devices for critical communication, such as emergency services, public safety, or industrial control systems, may face operational risks and data breaches. The confidentiality of administrative credentials is severely impacted, and integrity is at risk due to possible unauthorized modifications. Although availability is not directly affected, the downstream effects of compromised devices could include service disruptions. The requirement for access to the configuration file limits the attack surface, but insider threats or attackers exploiting other vulnerabilities to gain file access could leverage this weakness. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially as password cracking tools are widely available.

Mitigation Recommendations

1. Restrict access to the /etc/deviceconfig file using strict file permissions and access control lists to ensure only authorized system processes and administrators can read it. 2. Monitor and audit access to sensitive configuration files to detect unauthorized attempts. 3. Implement network segmentation and firewall rules to limit access to device management interfaces and file systems. 4. If possible, replace or upgrade devices to versions that use stronger password hashing algorithms with salting (e.g., bcrypt, PBKDF2, or Argon2). 5. Use compensating controls such as multi-factor authentication for device management to reduce the risk of credential misuse. 6. Regularly review and update device firmware and software to apply security patches once available. 7. Educate staff about the risks of insider threats and enforce strict operational security policies. 8. Consider encrypting sensitive configuration files at rest to add an additional layer of protection. 9. Conduct penetration testing and vulnerability assessments to identify and remediate related weaknesses in the environment.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-05-28T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c5db7ef31ef0b5635a6

Added to database: 2/25/2026, 9:40:45 PM

Last enriched: 2/28/2026, 3:24:41 AM

Last updated: 4/12/2026, 2:01:58 AM

Views: 15

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses