CVE Details
ID CVE-2013-6950
Summary The Belkin WeMo Home Automation firmware before 3949 does not use SSL for the distribution feed, which allows man-in-the-middle attackers to install arbitrary firmware by spoofing a distribution server.
References
Vulnerable Configurations
  • cpe:2.3:a:belkin:wemo_home_automation_firmware:2769:*:*:*:*:*:*:*
    cpe:2.3:a:belkin:wemo_home_automation_firmware:2769:*:*:*:*:*:*:*
CVSS
Base: 7.8 (as of 06-03-2014 - 04:49)
Impact: 6.9
Exploitability:10.0
CWE CWE-310
CAPEC Click the CAPEC title to display a description
  • An attacker obtains an authoritative or reputable signer's private signature key by exploiting a cryptographic weakness in the signature algorithm or pseudorandom number generation and then uses this key to forge signatures from the original signer to mislead a victim into performing actions that benefit the attacker.
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
COMPLETE NONE NONE
cvss-vector via4 AV:N/AC:L/Au:N/C:C/I:N/A:N
refmap via4
cert-vn VU#656302
misc http://www.ioactive.com/pdfs/IOActive_Belkin-advisory-lite.pdf
Last major update 06-03-2014 - 04:49
Published 22-02-2014 - 21:55
Last modified 06-03-2014 - 04:49