The ABUS Secvest wireless alarm system FUAA50000 (v3.01.17) fails to properly authenticate some requests to its built-in HTTPS interface. Someone can use this vulnerability to obtain sensitive information from the system, such as usernames and passwords. This information can then be used to reconfigure or disable the alarm system.
References
Link | Resource |
---|---|
https://eye.security/en/blog/breaking-abus-secvest-internet-connected-alarm-systems-cve-2020-28973 | Third Party Advisory |
https://eye.security/en/blog/breaking-abus-secvest-internet-connected-alarm-systems-cve-2020-28973 | Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 05:23
Type | Values Removed | Values Added |
---|---|---|
References | () https://eye.security/en/blog/breaking-abus-secvest-internet-connected-alarm-systems-cve-2020-28973 - Third Party Advisory |
Information
Published : 2021-04-21 19:15
Updated : 2024-11-21 05:23
NVD link : CVE-2020-28973
Mitre link : CVE-2020-28973
CVE.ORG link : CVE-2020-28973
JSON object : View
Products Affected
abus
- secvest_wireless_alarm_system_fuaa50000
- secvest_wireless_alarm_system_fuaa50000_firmware
CWE
CWE-287
Improper Authentication