CVE-2024-52876: n/a
Holy Stone Remote ID Module HSRID01, firmware distributed with the Drone Go2 mobile application before 1.1.8, allows unauthenticated "remote power off" actions (in broadcast mode) via multiple read operations on the ASTM Remote ID (0xFFFA) GATT.
AI Analysis
Technical Summary
CVE-2024-52876 identifies a security vulnerability in the Holy Stone Remote ID Module HSRID01 firmware distributed with the Drone Go2 mobile application prior to version 1.1.8. The vulnerability arises from the module's handling of the ASTM Remote ID (0xFFFA) Bluetooth GATT characteristic in broadcast mode. Specifically, an attacker can perform multiple unauthenticated read operations on this GATT characteristic, which triggers a remote power-off command on the drone. This behavior indicates a logic flaw or improper validation in the firmware's Bluetooth communication stack, allowing an out-of-bounds read condition (CWE-125) that leads to unintended device shutdown. The vulnerability requires no privileges or user interaction, and the attack vector is network-based via Bluetooth. The CVSS v3.1 base score is 7.5, reflecting high severity due to the network attack vector, lack of required privileges, no user interaction, and high confidentiality impact (likely due to potential data leakage or control information exposure), though integrity and availability impacts are not directly affected. No patches or exploits are currently publicly available, but the risk remains significant given the potential for disruption of drone operations.
Potential Impact
The primary impact of this vulnerability is the unauthorized remote shutdown of affected drones, which can lead to loss of control, mission failure, or physical damage if the drone crashes. For commercial operators, this could disrupt delivery services, aerial inspections, or agricultural monitoring. Recreational users may experience loss of expensive equipment. In critical infrastructure or public safety contexts, such as emergency response or surveillance, the ability to remotely power off drones could be exploited to disable monitoring capabilities or interfere with operations. The confidentiality impact is rated high, possibly due to exposure of Remote ID information during the attack, which could aid further reconnaissance or attacks. Although availability and integrity are not directly compromised by data manipulation, the forced shutdown effectively denies service. The ease of exploitation without authentication or user interaction increases the threat level, potentially enabling attackers in proximity to the drone to cause disruption with minimal effort.
Mitigation Recommendations
To mitigate this vulnerability, affected users should immediately update the Drone Go2 mobile application to version 1.1.8 or later once available, as this likely contains the necessary firmware fixes. Until patches are deployed, operators should restrict physical and wireless access to drones, especially disabling Bluetooth broadcast mode when not in use. Implementing Bluetooth signal range limitations and using secure pairing methods can reduce exposure. Network-level controls such as Bluetooth device whitelisting and monitoring for abnormal GATT read requests can help detect and prevent exploitation attempts. Manufacturers should consider firmware hardening to validate all GATT operations and implement authentication or authorization checks before executing critical commands like power off. Additionally, operators should conduct risk assessments for drone deployments in sensitive environments and develop contingency plans for potential drone shutdowns.
Affected Countries
United States, Canada, United Kingdom, Germany, France, Australia, Japan, South Korea, China, India
CVE-2024-52876: n/a
Description
Holy Stone Remote ID Module HSRID01, firmware distributed with the Drone Go2 mobile application before 1.1.8, allows unauthenticated "remote power off" actions (in broadcast mode) via multiple read operations on the ASTM Remote ID (0xFFFA) GATT.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2024-52876 identifies a security vulnerability in the Holy Stone Remote ID Module HSRID01 firmware distributed with the Drone Go2 mobile application prior to version 1.1.8. The vulnerability arises from the module's handling of the ASTM Remote ID (0xFFFA) Bluetooth GATT characteristic in broadcast mode. Specifically, an attacker can perform multiple unauthenticated read operations on this GATT characteristic, which triggers a remote power-off command on the drone. This behavior indicates a logic flaw or improper validation in the firmware's Bluetooth communication stack, allowing an out-of-bounds read condition (CWE-125) that leads to unintended device shutdown. The vulnerability requires no privileges or user interaction, and the attack vector is network-based via Bluetooth. The CVSS v3.1 base score is 7.5, reflecting high severity due to the network attack vector, lack of required privileges, no user interaction, and high confidentiality impact (likely due to potential data leakage or control information exposure), though integrity and availability impacts are not directly affected. No patches or exploits are currently publicly available, but the risk remains significant given the potential for disruption of drone operations.
Potential Impact
The primary impact of this vulnerability is the unauthorized remote shutdown of affected drones, which can lead to loss of control, mission failure, or physical damage if the drone crashes. For commercial operators, this could disrupt delivery services, aerial inspections, or agricultural monitoring. Recreational users may experience loss of expensive equipment. In critical infrastructure or public safety contexts, such as emergency response or surveillance, the ability to remotely power off drones could be exploited to disable monitoring capabilities or interfere with operations. The confidentiality impact is rated high, possibly due to exposure of Remote ID information during the attack, which could aid further reconnaissance or attacks. Although availability and integrity are not directly compromised by data manipulation, the forced shutdown effectively denies service. The ease of exploitation without authentication or user interaction increases the threat level, potentially enabling attackers in proximity to the drone to cause disruption with minimal effort.
Mitigation Recommendations
To mitigate this vulnerability, affected users should immediately update the Drone Go2 mobile application to version 1.1.8 or later once available, as this likely contains the necessary firmware fixes. Until patches are deployed, operators should restrict physical and wireless access to drones, especially disabling Bluetooth broadcast mode when not in use. Implementing Bluetooth signal range limitations and using secure pairing methods can reduce exposure. Network-level controls such as Bluetooth device whitelisting and monitoring for abnormal GATT read requests can help detect and prevent exploitation attempts. Manufacturers should consider firmware hardening to validate all GATT operations and implement authentication or authorization checks before executing critical commands like power off. Additionally, operators should conduct risk assessments for drone deployments in sensitive environments and develop contingency plans for potential drone shutdowns.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2024-11-17T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6bbab7ef31ef0b55a6ef
Added to database: 2/25/2026, 9:38:02 PM
Last enriched: 2/28/2026, 3:07:12 AM
Last updated: 4/12/2026, 1:57:48 PM
Views: 19
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.