CVE Details
ID CVE-2013-6952
Summary The Belkin WeMo Home Automation firmware before 3949 has a hardcoded GPG key, which makes it easier for remote attackers to spoof firmware updates and execute arbitrary code via crafted signed data.
References
Vulnerable Configurations
  • cpe:2.3:a:belkin:wemo_home_automation_firmware:2769:*:*:*:*:*:*:*
    cpe:2.3:a:belkin:wemo_home_automation_firmware:2769:*:*:*:*:*:*:*
CVSS
Base: 10.0 (as of 06-03-2014 - 04:49)
Impact: 10.0
Exploitability:10.0
CWE CWE-310
CAPEC Click the CAPEC title to display a description
  • An attacker obtains an authoritative or reputable signer's private signature key by exploiting a cryptographic weakness in the signature algorithm or pseudorandom number generation and then uses this key to forge signatures from the original signer to mislead a victim into performing actions that benefit the attacker.
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
COMPLETE COMPLETE COMPLETE
cvss-vector via4 AV:N/AC:L/Au:N/C:C/I:C/A:C
refmap via4
cert-vn VU#656302
misc http://www.ioactive.com/pdfs/IOActive_Belkin-advisory-lite.pdf
Last major update 06-03-2014 - 04:49
Published 22-02-2014 - 21:55
Last modified 06-03-2014 - 04:49