Fibaro Home Center 2 and Lite devices with firmware version 4.600 and older initiate SSH connections to the Fibaro cloud to provide remote access and remote support capabilities. This connection can be intercepted using DNS spoofing attack and a device initiated remote port-forward channel can be used to connect to the web management interface. Knowledge of authorization credentials to the management interface is required to perform any further actions.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/162243/Fibaro-Home-Center-MITM-Missing-Authentication-Code-Execution.html | Exploit Third Party Advisory VDB Entry |
http://seclists.org/fulldisclosure/2021/Apr/27 | Mailing List Third Party Advisory |
https://www.iot-inspector.com/blog/advisory-fibaro-home-center/ | Exploit Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: CERTVDE
Published: 2021-04-15T00:00:00
Updated: 2022-09-30T09:15:16
Reserved: 2020-12-17T00:00:00
Link: CVE-2021-20989
JSON object: View
NVD Information
Status : Analyzed
Published: 2021-04-19T14:15:11.570
Modified: 2022-10-29T02:49:32.803
Link: CVE-2021-20989
JSON object: View
Redhat Information
No data.
CWE