CVE-2024-57174
Published: 05 March 2025
Summary
CVE-2024-57174 is a high-severity an unspecified weakness vulnerability in Medium (inferred from references). Its CVSS base score is 8.1 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Domains (T1583.001); ranked at the 49.3th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 CM-6 (Configuration Settings) and SC-22 (Architecture and Provisioning for Name/Address Resolution Service).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Enforces establishment and documentation of secure configuration settings for system components like firmware DNS suffixes, directly preventing use of unclaimed domains.
Requires secure architecture and provisioning for name/address resolution services, preventing reliance on registrable domains as default DNS suffixes.
Mandates identification, prioritization, and remediation of flaws such as the misconfigured DNS suffix in the Alphion firmware.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The misconfiguration exposes an unclaimed domain as the default DNS suffix, directly enabling attackers to register it and control wildcard DNS resolution for hijacking purposes.
NVD Description
A misconfiguration in Alphion ASEE-1443 Firmware v0.4.H.00.02.15 defines a previously unregistered domain name as the default DNS suffix. This allows attackers to register the unclaimed domain and point its wildcard DNS entry to an attacker-controlled IP address, making it possible…
more
to access sensitive information.
Deeper analysisAI
CVE-2024-57174 is a misconfiguration vulnerability in Alphion ASEE-1443 Firmware version 0.4.H.00.02.15, where a previously unregistered domain name is defined as the default DNS suffix. This flaw affects Alphion routers running this specific firmware, enabling potential domain hijacking due to the unclaimed nature of the domain.
Attackers with low privileges (PR:L) and network access (AV:N) can exploit this vulnerability with low complexity (AC:L) and no user interaction (UI:N). By registering the unclaimed domain and configuring its wildcard DNS entry to point to an attacker-controlled IP address, they can achieve high confidentiality (C:H) and integrity (I:H) impacts, such as accessing sensitive information, while availability remains unaffected (A:N). The CVSS v3.1 base score is 8.1.
Advisories and additional details are available in the provided references, including a Medium article on internal domain names and a GitHub repository from BSides SG 2022 documenting the Alphion routers finding. No specific patch or mitigation steps are detailed in the core CVE information.
Details
- CWE(s)