CVE-2024-36443

7.6 HIGH

📋 TL;DR

Swissphone DiCal-RED 4009 devices have an anonymous FTP service that allows remote attackers to read almost the entire file system without authentication. This affects organizations using these radio data modules for emergency communications. The vulnerability exposes sensitive configuration and operational data.

💻 Affected Systems

Products:
  • Swissphone DiCal-RED 4009
Versions: All versions with default FTP configuration
Operating Systems: Embedded system firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Devices with anonymous FTP enabled are vulnerable. This appears to be the default configuration.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of device configuration, exposure of sensitive operational data, potential credential harvesting, and foothold for further attacks on connected systems.

🟠

Likely Case

Unauthorized access to configuration files, exposure of device settings, and potential collection of operational data that could aid in reconnaissance for further attacks.

🟢

If Mitigated

Limited exposure if FTP service is disabled or properly secured, with only minimal information leakage from accessible files.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires only standard FTP client tools. The advisory includes demonstration of file system access.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not available

Vendor Advisory: https://www.swissphone.com/en-us/solutions/components/terminals/radio-data-module-dical-red/

Restart Required: No

Instructions:

No official patch available. Disable anonymous FTP access via device configuration interface.

🔧 Temporary Workarounds

Disable Anonymous FTP

all

Configure FTP service to require authentication or disable FTP entirely if not needed

Network Segmentation

all

Isolate DiCal-RED devices in separate network segments with strict firewall rules

🧯 If You Can't Patch

  • Implement strict network access controls to limit FTP access to trusted IP addresses only
  • Monitor FTP logs for unauthorized access attempts and file listing activities

🔍 How to Verify

Check if Vulnerable:

Attempt anonymous FTP connection to port 21 on the device and try to list directory contents

Check Version:

Check device firmware version via web interface or console

Verify Fix Applied:

Verify FTP service requires authentication or is disabled. Test that anonymous access no longer works.

📡 Detection & Monitoring

Log Indicators:

  • Anonymous FTP login attempts
  • FTP directory listing commands
  • File download attempts from unusual locations

Network Indicators:

  • FTP connections from unauthorized IP addresses
  • FTP traffic patterns indicating file enumeration

SIEM Query:

source="ftp.log" AND (user="anonymous" OR user="ftp") AND action="LIST"

🔗 References

📤 Share & Export