CVE-2024-36442

8.8 HIGH

📋 TL;DR

This vulnerability in Swissphone DiCal-RED 4009 devices allows authenticated attackers to read arbitrary files from the device's file system through the cgi-bin/fdmcgiwebv2.cgi endpoint. This affects organizations using these radio data modules for emergency communications. Attackers with valid credentials can access sensitive configuration files, logs, and potentially credentials.

💻 Affected Systems

Products:
  • Swissphone DiCal-RED 4009
Versions: All versions prior to patch
Operating Systems: Embedded Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access to the web interface

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could extract cryptographic keys, credentials, or sensitive configuration data, potentially enabling further attacks on emergency communication systems or adjacent networks.

🟠

Likely Case

Unauthorized access to device configuration files, logs, and potentially stored credentials, compromising device integrity and confidentiality.

🟢

If Mitigated

Limited impact if strong authentication controls, network segmentation, and file permission restrictions are properly implemented.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires valid credentials but is straightforward once authenticated

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check with Swissphone for specific patched version

Vendor Advisory: https://www.swissphone.com/en-us/solutions/components/terminals/radio-data-module-dical-red/

Restart Required: Yes

Instructions:

1. Contact Swissphone support for latest firmware
2. Backup device configuration
3. Apply firmware update via web interface or console
4. Restart device
5. Verify fix by testing file access

🔧 Temporary Workarounds

Restrict Web Interface Access

linux

Limit access to the device web interface to trusted IP addresses only

iptables -A INPUT -p tcp --dport 80 -s TRUSTED_IP -j ACCEPT
iptables -A INPUT -p tcp --dport 443 -s TRUSTED_IP -j ACCEPT
iptables -A INPUT -p tcp --dport 80 -j DROP
iptables -A INPUT -p tcp --dport 443 -j DROP

Disable CGI Script

linux

Temporarily disable or remove the vulnerable CGI script

mv /cgi-bin/fdmcgiwebv2.cgi /cgi-bin/fdmcgiwebv2.cgi.disabled
chmod 000 /cgi-bin/fdmcgiwebv2.cgi.disabled

🧯 If You Can't Patch

  • Isolate device on separate VLAN with strict firewall rules
  • Implement strong authentication policies and monitor for suspicious access

🔍 How to Verify

Check if Vulnerable:

Authenticate to web interface and attempt to access /cgi-bin/fdmcgiwebv2.cgi with file traversal parameters

Check Version:

Check web interface admin page or contact Swissphone for version identification

Verify Fix Applied:

Attempt same file access after patch - should return error or be blocked

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed authentication attempts followed by successful login
  • Access to fdmcgiwebv2.cgi with file path parameters
  • Unusual file access patterns

Network Indicators:

  • HTTP requests to /cgi-bin/fdmcgiwebv2.cgi with ../ sequences
  • Traffic from unexpected sources to device management interface

SIEM Query:

source="device_logs" AND (uri="/cgi-bin/fdmcgiwebv2.cgi" OR (user_agent CONTAINS "../"))

🔗 References

📤 Share & Export