Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Fri, 27 Feb 2026 06:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Swissphone
Swissphone dical-red |
|
| CPEs | cpe:2.3:a:swissphone:dical-red:4009:*:*:*:*:*:*:* | |
| Vendors & Products |
Swissphone
Swissphone dical-red |
|
| Metrics |
ssvc
|
Fri, 23 Aug 2024 00:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | ||
| Vendors & Products |
Swissphone
Swissphone dical-red |
|
| References |
| |
| Metrics |
ssvc
|
Thu, 22 Aug 2024 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Swissphone
Swissphone dical-red |
|
| Weaknesses | CWE-1393 CWE-327 CWE-759 |
|
| CPEs | cpe:2.3:a:swissphone:dical-red:4009:*:*:*:*:*:*:* | |
| Vendors & Products |
Swissphone
Swissphone dical-red |
|
| Metrics |
cvssV3_1
|
Thu, 22 Aug 2024 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An issue was discovered on Swissphone DiCal-RED 4009 devices. An attacker with access to the file /etc/deviceconfig may recover the administrative device password via password-cracking methods, because unsalted MD5 is used. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-22T23:03:09.482Z
Reserved: 2024-05-28T00:00:00.000Z
Link: CVE-2024-36440
Updated: 2024-08-22T23:03:09.482Z
Status : Deferred
Published: 2024-08-22T15:15:15.977
Modified: 2026-04-15T00:35:42.020
Link: CVE-2024-36440
No data.
OpenCVE Enrichment
No data.