eQ-3 HomeMatic CCU3 firmware 3.41.11 allows session fixation. An attacker can create session IDs and send them to the victim. After the victim logs in to the session, the attacker can use that session. The attacker could create SSH logins after a valid session and easily compromise the system.
References
Link | Resource |
---|---|
https://noskill1337.github.io/homematic-ccu3-session-fixation | Exploit Mitigation Third Party Advisory |
https://www.eq-3.com/products/homematic.html | Vendor Advisory |
https://noskill1337.github.io/homematic-ccu3-session-fixation | Exploit Mitigation Third Party Advisory |
https://www.eq-3.com/products/homematic.html | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 04:29
Type | Values Removed | Values Added |
---|---|---|
References | () https://noskill1337.github.io/homematic-ccu3-session-fixation - Exploit, Mitigation, Third Party Advisory | |
References | () https://www.eq-3.com/products/homematic.html - Vendor Advisory |
Information
Published : 2019-10-17 14:15
Updated : 2024-11-21 04:29
NVD link : CVE-2019-15849
Mitre link : CVE-2019-15849
CVE.ORG link : CVE-2019-15849
JSON object : View
Products Affected
eq-3
- homematic_ccu3
- homematic_ccu3_firmware
CWE
CWE-384
Session Fixation