eQ-3 HomeMatic CCU2 devices before 2.41.8 and CCU3 devices before 3.43.15 use session IDs for authentication but lack authorization checks. An attacker can obtain a session ID via the user authentication dialogue, aka HMCCU-153. This leads to automatic login as admin.
References
Link | Resource |
---|---|
https://os-s.de/advisories/OSS-2018-01.pdf | Broken Link |
https://www.eq-3.de/Downloads/Software/CCU3-Firmware/CCU3-3.43.16/CCU3-Changelog.3.43.16.pdf | Release Notes Vendor Advisory |
https://www.eq-3.de/Downloads/Software/HM-CCU2-Firmware_Updates/HM-CCU-2.41.9/HM-CCU2-Changelog.2.41.9.pdf | Release Notes Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2019-07-10T11:54:13
Updated: 2019-07-10T11:54:13
Reserved: 2019-03-27T00:00:00
Link: CVE-2019-10121
JSON object: View
NVD Information
Status : Analyzed
Published: 2019-07-10T12:15:12.250
Modified: 2020-08-24T17:37:01.140
Link: CVE-2019-10121
JSON object: View
Redhat Information
No data.
CWE