An exploitable firmware downgrade vulnerability exists in Insteon Hub running firmware version 1013. The firmware upgrade functionality, triggered via PubNub, retrieves signed firmware binaries using plain HTTP requests. The device doesn't check the firmware version that is going to be installed and thus allows for flashing older firmware images. To trigger this vulnerability, an attacker needs to impersonate the remote server 'cache.insteon.com' and serve any signed firmware image.
References
Link | Resource |
---|---|
https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0512 | Exploit Technical Description Third Party Advisory |
https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0512 | Exploit Technical Description Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 04:06
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0512 - Exploit, Technical Description, Third Party Advisory |
Information
Published : 2018-08-23 14:29
Updated : 2024-11-21 04:06
NVD link : CVE-2018-3833
Mitre link : CVE-2018-3833
CVE.ORG link : CVE-2018-3833
JSON object : View
Products Affected
insteon
- hub_2245-222_firmware
- hub_2245-222
CWE