The Belkin WeMo Home Automation firmware before 3949 has a hardcoded GPG key, which makes it easier for remote attackers to spoof firmware updates and execute arbitrary code via crafted signed data.
References
Link | Resource |
---|---|
http://www.ioactive.com/pdfs/IOActive_Belkin-advisory-lite.pdf | |
http://www.kb.cert.org/vuls/id/656302 | US Government Resource |
http://www.ioactive.com/pdfs/IOActive_Belkin-advisory-lite.pdf | |
http://www.kb.cert.org/vuls/id/656302 | US Government Resource |
Configurations
History
21 Nov 2024, 02:00
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.ioactive.com/pdfs/IOActive_Belkin-advisory-lite.pdf - | |
References | () http://www.kb.cert.org/vuls/id/656302 - US Government Resource |
Information
Published : 2014-02-22 21:55
Updated : 2024-11-21 02:00
NVD link : CVE-2013-6952
Mitre link : CVE-2013-6952
CVE.ORG link : CVE-2013-6952
JSON object : View
Products Affected
belkin
- wemo_home_automation_firmware
CWE
CWE-310
Cryptographic Issues