Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-36441: n/a

0
Medium
VulnerabilityCVE-2024-36441cvecve-2024-36441
Published: Thu Aug 22 2024 (08/22/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

Swissphone DiCal-RED 4009 devices allow an unauthenticated attacker use a port-2101 TCP connection to gain access to operation messages that are received by the device.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 03:24:55 UTC

Technical Analysis

CVE-2024-36441 identifies a vulnerability in Swissphone DiCal-RED 4009 devices that permits unauthenticated attackers to establish a TCP connection on port 2101 and access operational messages received by the device. The vulnerability stems from insufficient access control (CWE-284), allowing attackers to bypass authentication mechanisms and retrieve sensitive communication data. The CVSS v3.1 base score is 5.4, reflecting medium severity, with the vector indicating the attack requires physical or network proximity (AV:P), low attack complexity (AC:L), no privileges (PR:N), but requires user interaction (UI:R). The scope is unchanged (S:U), with high confidentiality impact (C:H), low integrity (I:L), and low availability (A:L) impacts. These devices are typically used in emergency and critical communication infrastructures, making the confidentiality breach particularly concerning. No patches or fixes have been published yet, and no active exploitation has been reported. The vulnerability highlights the risk of exposing sensitive operational messages to unauthorized parties, potentially undermining trust and operational security in critical communication environments.

Potential Impact

The primary impact of CVE-2024-36441 is the unauthorized disclosure of sensitive operational messages, which can compromise confidentiality. This could lead to exposure of critical communication data, potentially revealing emergency response plans, operational statuses, or other sensitive information. Although the integrity and availability impacts are low, the confidentiality breach could enable adversaries to gather intelligence or disrupt trust in emergency communication systems. Organizations relying on Swissphone DiCal-RED 4009 devices, especially in public safety, emergency services, and critical infrastructure sectors, face increased risks of data leakage and potential operational disruption. The medium severity score reflects the balance between ease of exploitation and the significant confidentiality impact. The lack of authentication and the use of a commonly accessible TCP port increase the attack surface, especially in environments where network segmentation is insufficient.

Mitigation Recommendations

1. Immediately restrict network access to TCP port 2101 on Swissphone DiCal-RED 4009 devices using firewalls or network segmentation to limit exposure to trusted management networks only. 2. Implement strict access control lists (ACLs) to prevent unauthorized connections from untrusted sources. 3. Monitor network traffic for unusual or unauthorized connections to port 2101 and establish alerting mechanisms for suspicious activity. 4. Engage with Swissphone or authorized vendors to obtain guidance on patches or firmware updates addressing this vulnerability as they become available. 5. Consider deploying intrusion detection/prevention systems (IDS/IPS) tuned to detect exploitation attempts targeting this vulnerability. 6. Conduct regular security audits and penetration testing focused on device communication channels to identify and remediate similar weaknesses. 7. Educate operational staff about the risks of exposing device management ports and enforce strict operational security policies. 8. Where possible, isolate critical communication devices on dedicated, secure networks with limited external access.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-05-28T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c5db7ef31ef0b5635ab

Added to database: 2/25/2026, 9:40:45 PM

Last enriched: 2/28/2026, 3:24:55 AM

Last updated: 4/12/2026, 1:59:43 PM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses