CVE-2024-36442
📋 TL;DR
This vulnerability in Swissphone DiCal-RED 4009 devices allows authenticated attackers to read arbitrary files from the device's file system through the cgi-bin/fdmcgiwebv2.cgi endpoint. This affects organizations using these radio data modules for emergency communications. Attackers with valid credentials can access sensitive configuration files, logs, and potentially credentials.
💻 Affected Systems
- Swissphone DiCal-RED 4009
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Attackers could extract cryptographic keys, credentials, or sensitive configuration data, potentially enabling further attacks on emergency communication systems or adjacent networks.
Likely Case
Unauthorized access to device configuration files, logs, and potentially stored credentials, compromising device integrity and confidentiality.
If Mitigated
Limited impact if strong authentication controls, network segmentation, and file permission restrictions are properly implemented.
🎯 Exploit Status
Exploitation requires valid credentials but is straightforward once authenticated
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Check with Swissphone for specific patched version
Vendor Advisory: https://www.swissphone.com/en-us/solutions/components/terminals/radio-data-module-dical-red/
Restart Required: Yes
Instructions:
1. Contact Swissphone support for latest firmware
2. Backup device configuration
3. Apply firmware update via web interface or console
4. Restart device
5. Verify fix by testing file access
🔧 Temporary Workarounds
Restrict Web Interface Access
linuxLimit access to the device web interface to trusted IP addresses only
iptables -A INPUT -p tcp --dport 80 -s TRUSTED_IP -j ACCEPT
iptables -A INPUT -p tcp --dport 443 -s TRUSTED_IP -j ACCEPT
iptables -A INPUT -p tcp --dport 80 -j DROP
iptables -A INPUT -p tcp --dport 443 -j DROP
Disable CGI Script
linuxTemporarily disable or remove the vulnerable CGI script
mv /cgi-bin/fdmcgiwebv2.cgi /cgi-bin/fdmcgiwebv2.cgi.disabled
chmod 000 /cgi-bin/fdmcgiwebv2.cgi.disabled
🧯 If You Can't Patch
- Isolate device on separate VLAN with strict firewall rules
- Implement strong authentication policies and monitor for suspicious access
🔍 How to Verify
Check if Vulnerable:
Authenticate to web interface and attempt to access /cgi-bin/fdmcgiwebv2.cgi with file traversal parameters
Check Version:
Check web interface admin page or contact Swissphone for version identification
Verify Fix Applied:
Attempt same file access after patch - should return error or be blocked
📡 Detection & Monitoring
Log Indicators:
- Multiple failed authentication attempts followed by successful login
- Access to fdmcgiwebv2.cgi with file path parameters
- Unusual file access patterns
Network Indicators:
- HTTP requests to /cgi-bin/fdmcgiwebv2.cgi with ../ sequences
- Traffic from unexpected sources to device management interface
SIEM Query:
source="device_logs" AND (uri="/cgi-bin/fdmcgiwebv2.cgi" OR (user_agent CONTAINS "../"))