Summary
Detail | |||
---|---|---|---|
Vendor | Eq-3 | First view | 2018-02-22 |
Product | Homematic Central Control Unit ccu2 Firmware | Last view | 2018-02-22 |
Version | 2.29.22 | Type | Os |
Update | * | ||
Edition | * | ||
Language | * | ||
Sofware Edition | * | ||
Target Software | * | ||
Target Hardware | * | ||
Other | * | ||
CPE Product | cpe:2.3:o:eq-3:homematic_central_control_unit_ccu2_firmware |
Activity : Overall
Related : CVE
Date | Alert | Description | |
---|---|---|---|
9.8 | 2018-02-22 | CVE-2018-7301 | eQ-3 AG HomeMatic CCU2 2.29.22 devices have an open XML-RPC port without authentication. This can be exploited by sending arbitrary XML-RPC requests to control the attached BidCos devices. |
8 | 2018-02-22 | CVE-2018-7299 | Remote Code Execution in the addon installation process in eQ-3 AG Homematic CCU2 2.29.2 and earlier allows authenticated attackers to create or overwrite arbitrary files or install malicious software on the device. |
8.1 | 2018-02-22 | CVE-2018-7298 | In /usr/local/etc/config/addons/mh/loopupd.sh on eQ-3 AG HomeMatic CCU2 2.29.22 devices, software update packages are downloaded via the HTTP protocol, which does not provide any cryptographic protection of the downloaded contents. An attacker with a privileged network position (which could be obtained via DNS spoofing of www.meine-homematic.de or other approaches) can exploit this issue in order to provide arbitrary malicious firmware updates to the CCU2. This can result in a full system compromise. |
9.8 | 2018-02-22 | CVE-2018-7297 | Remote Code Execution in the TCL script interpreter in eQ-3 AG Homematic CCU2 2.29.2 and earlier allows remote attackers to obtain read/write access and execute system commands on the device. This vulnerability can be exploited by unauthenticated attackers with access to the web interface. |
5.3 | 2018-02-22 | CVE-2018-7296 | Directory Traversal / Arbitrary File Read in User.getLanguage method in eQ-3 AG Homematic CCU2 2.29.2 and earlier allows remote attackers to read the first line of an arbitrary file on the CCU2's filesystem. This vulnerability can be exploited by unauthenticated attackers with access to the web interface. |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
33% (1) | CWE-319 | Cleartext Transmission of Sensitive Information |
33% (1) | CWE-306 | Missing Authentication for Critical Function |
33% (1) | CWE-22 | Improper Limitation of a Pathname to a Restricted Directory ('Path ... |
Snort® IPS/IDS
Date | Description |
---|---|
2018-09-11 | HomeMatic CCU2 remote arbitrary code execution attempt RuleID : 47470 - Type : SERVER-WEBAPP - Revision : 2 |