Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-52876: n/a

0
High
VulnerabilityCVE-2024-52876cvecve-2024-52876
Published: Sun Nov 17 2024 (11/17/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

Holy Stone Remote ID Module HSRID01, firmware distributed with the Drone Go2 mobile application before 1.1.8, allows unauthenticated "remote power off" actions (in broadcast mode) via multiple read operations on the ASTM Remote ID (0xFFFA) GATT.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 03:07:12 UTC

Technical Analysis

CVE-2024-52876 identifies a security vulnerability in the Holy Stone Remote ID Module HSRID01 firmware distributed with the Drone Go2 mobile application prior to version 1.1.8. The vulnerability arises from the module's handling of the ASTM Remote ID (0xFFFA) Bluetooth GATT characteristic in broadcast mode. Specifically, an attacker can perform multiple unauthenticated read operations on this GATT characteristic, which triggers a remote power-off command on the drone. This behavior indicates a logic flaw or improper validation in the firmware's Bluetooth communication stack, allowing an out-of-bounds read condition (CWE-125) that leads to unintended device shutdown. The vulnerability requires no privileges or user interaction, and the attack vector is network-based via Bluetooth. The CVSS v3.1 base score is 7.5, reflecting high severity due to the network attack vector, lack of required privileges, no user interaction, and high confidentiality impact (likely due to potential data leakage or control information exposure), though integrity and availability impacts are not directly affected. No patches or exploits are currently publicly available, but the risk remains significant given the potential for disruption of drone operations.

Potential Impact

The primary impact of this vulnerability is the unauthorized remote shutdown of affected drones, which can lead to loss of control, mission failure, or physical damage if the drone crashes. For commercial operators, this could disrupt delivery services, aerial inspections, or agricultural monitoring. Recreational users may experience loss of expensive equipment. In critical infrastructure or public safety contexts, such as emergency response or surveillance, the ability to remotely power off drones could be exploited to disable monitoring capabilities or interfere with operations. The confidentiality impact is rated high, possibly due to exposure of Remote ID information during the attack, which could aid further reconnaissance or attacks. Although availability and integrity are not directly compromised by data manipulation, the forced shutdown effectively denies service. The ease of exploitation without authentication or user interaction increases the threat level, potentially enabling attackers in proximity to the drone to cause disruption with minimal effort.

Mitigation Recommendations

To mitigate this vulnerability, affected users should immediately update the Drone Go2 mobile application to version 1.1.8 or later once available, as this likely contains the necessary firmware fixes. Until patches are deployed, operators should restrict physical and wireless access to drones, especially disabling Bluetooth broadcast mode when not in use. Implementing Bluetooth signal range limitations and using secure pairing methods can reduce exposure. Network-level controls such as Bluetooth device whitelisting and monitoring for abnormal GATT read requests can help detect and prevent exploitation attempts. Manufacturers should consider firmware hardening to validate all GATT operations and implement authentication or authorization checks before executing critical commands like power off. Additionally, operators should conduct risk assessments for drone deployments in sensitive environments and develop contingency plans for potential drone shutdowns.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-11-17T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6bbab7ef31ef0b55a6ef

Added to database: 2/25/2026, 9:38:02 PM

Last enriched: 2/28/2026, 3:07:12 AM

Last updated: 4/12/2026, 1:57:48 PM

Views: 19

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses