Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-36443: n/a

0
High
VulnerabilityCVE-2024-36443cvecve-2024-36443
Published: Thu Aug 22 2024 (08/22/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

Swissphone DiCal-RED 4009 devices allow a remote attacker to gain read access to almost the whole file system via anonymous FTP.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 03:25:26 UTC

Technical Analysis

CVE-2024-36443 is a vulnerability identified in Swissphone DiCal-RED 4009 devices that permits remote attackers to gain unauthorized read access to almost the entire file system via anonymous FTP. The flaw stems from improper access control (CWE-284) on the FTP service, which allows anonymous users to connect and browse sensitive files without authentication. The vulnerability is remotely exploitable over the network (AV:N) with low attack complexity (AC:L), requiring low privileges (PR:L) but no user interaction (UI:N). The scope remains unchanged (S:U), meaning the impact is confined to the vulnerable device. The confidentiality impact is high, as attackers can access sensitive configuration files, logs, or other critical data. Integrity impact is low since the vulnerability does not allow modification, and availability impact is low due to limited disruption potential. No patches or updates have been published yet, and no exploits have been observed in the wild. The affected versions are unspecified, but the device model is clearly identified. This vulnerability poses a significant risk to organizations relying on Swissphone DiCal-RED 4009 devices for communication, especially in emergency and critical infrastructure sectors where confidentiality of operational data is paramount.

Potential Impact

The primary impact of CVE-2024-36443 is the unauthorized disclosure of sensitive information stored on Swissphone DiCal-RED 4009 devices. Attackers can remotely access configuration files, logs, and possibly credentials or operational data, which could facilitate further attacks or espionage. This exposure can undermine the confidentiality of emergency communication systems, potentially compromising operational security and trust. Although the vulnerability does not allow modification or disruption of device functionality, the leakage of sensitive data can have severe consequences, including intelligence gathering by adversaries, privacy violations, and regulatory non-compliance. Organizations worldwide using these devices in critical communication roles may face increased risk of targeted attacks or data breaches. The lack of available patches increases the window of exposure, necessitating immediate mitigation to prevent exploitation.

Mitigation Recommendations

Until an official patch is released, organizations should implement the following mitigations: 1) Disable or restrict FTP services on Swissphone DiCal-RED 4009 devices, especially anonymous FTP access, by configuring access controls or firewall rules to limit connections to trusted IP addresses. 2) Monitor network traffic for unusual FTP activity targeting these devices to detect potential exploitation attempts. 3) Segment the network to isolate these devices from untrusted networks and reduce exposure. 4) Employ intrusion detection or prevention systems (IDS/IPS) with signatures or heuristics for FTP anomalies. 5) Review and harden device configurations to minimize sensitive data stored on accessible file systems. 6) Engage with Swissphone support for updates or guidance and subscribe to vulnerability advisories for timely patching once available. 7) Conduct regular audits and penetration testing to verify the effectiveness of mitigations. These steps go beyond generic advice by focusing on access control, monitoring, and network segmentation specific to the device and vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-05-28T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c5db7ef31ef0b5635b5

Added to database: 2/25/2026, 9:40:45 PM

Last enriched: 2/28/2026, 3:25:26 AM

Last updated: 4/12/2026, 4:22:09 PM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses