Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-36445: n/a

0
Critical
VulnerabilityCVE-2024-36445cvecve-2024-36445
Published: Thu Aug 22 2024 (08/22/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

Swissphone DiCal-RED 4009 devices allow a remote attacker to gain a root shell via TELNET without authentication.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 03:25:55 UTC

Technical Analysis

CVE-2024-36445 identifies a critical security vulnerability in the Swissphone DiCal-RED 4009 device, a communication device commonly used in paging and alerting systems. The vulnerability allows an unauthenticated remote attacker to connect to the device via TELNET and obtain a root shell, effectively gaining full control over the device. The root cause is a lack of authentication enforcement on the TELNET service, classified under CWE-306 (Missing Authentication for Critical Function). The CVSS v3.1 base score of 9.8 indicates that the attack vector is network-based (AV:N), requires no privileges (PR:N), no user interaction (UI:N), and impacts confidentiality, integrity, and availability at a high level (C:H/I:H/A:H). This means an attacker can remotely execute arbitrary commands with root privileges, potentially disrupting critical communication services or using the device as a foothold for further network compromise. The vulnerability was reserved in May 2024 and published in August 2024, but no patches or mitigations have been officially released by Swissphone at the time of this report. The absence of authentication on TELNET is a severe security oversight, especially given the sensitive nature of these devices in emergency and industrial communication environments.

Potential Impact

The impact of this vulnerability is severe for organizations relying on Swissphone DiCal-RED 4009 devices, particularly in sectors such as emergency services, public safety, utilities, and industrial control systems. An attacker gaining root access can manipulate device configurations, intercept or alter communications, disrupt alerting functions, or pivot to other network assets, potentially causing widespread operational disruption. The compromise of these devices could lead to loss of confidentiality of sensitive communications, integrity violations through unauthorized command execution, and availability issues by disabling or corrupting device functionality. Given the critical role these devices play in alerting and paging systems, exploitation could have life-threatening consequences in emergency response scenarios. The lack of authentication and ease of exploitation make this vulnerability highly attractive to attackers, including nation-state actors and cybercriminals targeting critical infrastructure.

Mitigation Recommendations

Since no official patches are currently available, organizations should immediately implement network-level mitigations. These include disabling TELNET access to the affected devices or restricting TELNET connections to trusted management networks using firewall rules or network segmentation. Employ VPNs or secure tunnels for remote management instead of TELNET. Monitor network traffic for unusual TELNET connection attempts and implement intrusion detection/prevention systems (IDS/IPS) to alert on or block suspicious activity. If possible, replace or upgrade devices to models with secure management interfaces that enforce authentication. Additionally, conduct thorough audits of device configurations and network architecture to minimize exposure. Establish incident response plans to quickly isolate compromised devices and remediate potential breaches. Engage with Swissphone support for updates and patches as they become available.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-05-28T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c5db7ef31ef0b5635bf

Added to database: 2/25/2026, 9:40:45 PM

Last enriched: 2/28/2026, 3:25:55 AM

Last updated: 4/12/2026, 7:51:41 AM

Views: 15

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses