In Fibaro Home Center 2 and Lite devices in all versions provide a web based management interface over unencrypted HTTP protocol. Communication between the user and the device can be eavesdropped to hijack sessions, tokens and passwords.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/162243/Fibaro-Home-Center-MITM-Missing-Authentication-Code-Execution.html | Exploit Third Party Advisory VDB Entry |
http://seclists.org/fulldisclosure/2021/Apr/27 | Mailing List Third Party Advisory |
https://www.iot-inspector.com/blog/advisory-fibaro-home-center/ | Exploit Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: CERTVDE
Published: 2021-04-15T00:00:00
Updated: 2021-04-20T17:06:19
Reserved: 2020-12-17T00:00:00
Link: CVE-2021-20992
JSON object: View
NVD Information
Status : Analyzed
Published: 2021-04-19T14:15:11.883
Modified: 2021-04-23T16:08:58.107
Link: CVE-2021-20992
JSON object: View
Redhat Information
No data.
CWE