CVE-2020-27488

Loxone Miniserver devices with firmware before 11.1 (aka 11.1.9.3) are unable to use an authentication method that is based on the "signature of the update package." Therefore, these devices (or attackers who are spoofing these devices) can continue to use an unauthenticated cloud service for an indeterminate time period (possibly forever). Once an individual device's firmware is updated, and authentication occurs once, the cloud service recategorizes the device so that authentication is subsequently always required, and spoofing cannot occur.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:loxone:miniserver_gen_1_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:loxone:miniserver_gen_1:-:*:*:*:*:*:*:*

History

21 Nov 2024, 05:21

Type Values Removed Values Added
References () https://iot-lab-fh-ooe.github.io/loxone_clouddns_schwachstelle/ - Exploit, Third Party Advisory () https://iot-lab-fh-ooe.github.io/loxone_clouddns_schwachstelle/ - Exploit, Third Party Advisory
References () https://iot-lab-fh-ooe.github.io/loxone_clouddns_vulnerability/ - Exploit, Third Party Advisory () https://iot-lab-fh-ooe.github.io/loxone_clouddns_vulnerability/ - Exploit, Third Party Advisory
References () https://www.loxone.com/dede/sicherheit-cloud-dns/ - Product, Vendor Advisory () https://www.loxone.com/dede/sicherheit-cloud-dns/ - Product, Vendor Advisory
References () https://www.loxone.com/enen/security-cloud-dns/ - Vendor Advisory () https://www.loxone.com/enen/security-cloud-dns/ - Vendor Advisory

Information

Published : 2021-01-13 20:15

Updated : 2024-11-21 05:21


NVD link : CVE-2020-27488

Mitre link : CVE-2020-27488

CVE.ORG link : CVE-2020-27488


JSON object : View

Products Affected

loxone

  • miniserver_gen_1_firmware
  • miniserver_gen_1
CWE
CWE-287

Improper Authentication