The Belkin WeMo Home Automation firmware before 3949 does not maintain a set of Certification Authority public keys, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary X.509 certificate.
References
Link | Resource |
---|---|
http://www.ioactive.com/pdfs/IOActive_Belkin-advisory-lite.pdf | |
http://www.kb.cert.org/vuls/id/656302 | US Government Resource |
http://www.ioactive.com/pdfs/IOActive_Belkin-advisory-lite.pdf | |
http://www.kb.cert.org/vuls/id/656302 | US Government Resource |
Configurations
History
21 Nov 2024, 02:00
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.ioactive.com/pdfs/IOActive_Belkin-advisory-lite.pdf - | |
References | () http://www.kb.cert.org/vuls/id/656302 - US Government Resource |
Information
Published : 2014-02-22 21:55
Updated : 2024-11-21 02:00
NVD link : CVE-2013-6951
Mitre link : CVE-2013-6951
CVE.ORG link : CVE-2013-6951
JSON object : View
Products Affected
belkin
- wemo_home_automation_firmware
CWE
CWE-310
Cryptographic Issues