CVE-2024-25735
📋 TL;DR
This vulnerability allows remote attackers to retrieve cleartext passwords from WyreStorm Apollo VX20 devices by sending a specific HTTP GET request to the SoftAP configuration endpoint. Attackers can gain administrative access to affected devices without authentication. Organizations using WyreStorm Apollo VX20 devices for AV/streaming applications are affected.
💻 Affected Systems
- WyreStorm Apollo VX20
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete device compromise allowing attackers to reconfigure devices, intercept sensitive AV streams, pivot to internal networks, and establish persistent backdoors.
Likely Case
Attackers gain administrative access to devices, potentially disrupting AV operations, accessing connected systems, and stealing credentials for lateral movement.
If Mitigated
Limited to device configuration exposure if proper network segmentation and access controls prevent external exploitation.
🎯 Exploit Status
Exploit requires simple HTTP GET request to /device/config endpoint. Public exploit code available in Packet Storm disclosures.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 1.3.58
Vendor Advisory: Not provided in references
Restart Required: Yes
Instructions:
1. Download firmware version 1.3.58 from WyreStorm support portal. 2. Access device web interface. 3. Navigate to System > Firmware Update. 4. Upload and apply the new firmware. 5. Reboot device after update completes.
🔧 Temporary Workarounds
Network Segmentation
allIsolate WyreStorm devices on separate VLAN with strict firewall rules preventing external access to device management interfaces.
Access Control Lists
allImplement network ACLs to restrict access to device IP addresses on port 80/443 to authorized management stations only.
🧯 If You Can't Patch
- Physically disconnect devices from networks with untrusted users
- Change all device passwords after verifying no unauthorized access occurred
🔍 How to Verify
Check if Vulnerable:
Send HTTP GET request to http://[device_ip]/device/config and check if response contains cleartext passwords. Use curl: curl -X GET http://device_ip/device/config
Check Version:
Access device web interface > System > About to check firmware version, or use API endpoint if available.
Verify Fix Applied:
After updating to 1.3.58, same GET request should return encrypted/hashed passwords or access denied response.
📡 Detection & Monitoring
Log Indicators:
- HTTP GET requests to /device/config endpoint from unauthorized IPs
- Multiple failed login attempts followed by successful access
Network Indicators:
- Unusual HTTP traffic to device management ports from unexpected sources
- Traffic patterns suggesting configuration scraping
SIEM Query:
sourceIP=* destIP=[device_ip] destPort=80 OR destPort=443 uriPath="/device/config" method=GET