CVE-2018-3833

An exploitable firmware downgrade vulnerability exists in Insteon Hub running firmware version 1013. The firmware upgrade functionality, triggered via PubNub, retrieves signed firmware binaries using plain HTTP requests. The device doesn't check the firmware version that is going to be installed and thus allows for flashing older firmware images. To trigger this vulnerability, an attacker needs to impersonate the remote server 'cache.insteon.com' and serve any signed firmware image.
References
Link Resource
https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0512 Exploit Technical Description Third Party Advisory
https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0512 Exploit Technical Description Third Party Advisory
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:insteon:hub_2245-222_firmware:1013:*:*:*:*:*:*:*
cpe:2.3:h:insteon:hub_2245-222:-:*:*:*:*:*:*:*

History

21 Nov 2024, 04:06

Type Values Removed Values Added
References () https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0512 - Exploit, Technical Description, Third Party Advisory () https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0512 - Exploit, Technical Description, Third Party Advisory

Information

Published : 2018-08-23 14:29

Updated : 2024-11-21 04:06


NVD link : CVE-2018-3833

Mitre link : CVE-2018-3833

CVE.ORG link : CVE-2018-3833


JSON object : View

Products Affected

insteon

  • hub_2245-222_firmware
  • hub_2245-222