Vulnerabilites related to eq-3 - homematic_ccu3
Vulnerability from fkie_nvd
Published
2019-11-14 19:15
Modified
2024-11-21 04:33
Severity ?
Summary
eQ-3 Homematic CCU2 2.47.20 and CCU3 3.47.18 with the HM-Print AddOn through 1.2a installed allow Remote Code Execution by unauthenticated attackers with access to the web interface via the exec.cgi and exec1.cgi scripts, which execute TCL script content from an HTTP POST request.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://psytester.github.io/CVE-2019-18939/ | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://psytester.github.io/CVE-2019-18939/ | Exploit, Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
hm-print_project | hm-print | 1.2a | |
eq-3 | homematic_ccu2 | - | |
eq-3 | homematic_ccu2_firmware | 2.47.20 | |
hm-print_project | hm-print | 1.2 | |
eq-3 | homematic_ccu3 | - | |
eq-3 | homematic_ccu3_firmware | 3.47.18 | |
hm-print_project | hm-print | 1.2a | |
eq-3 | homematic_ccu3 | - | |
eq-3 | homematic_ccu3_firmware | 3.47.18 | |
hm-print_project | hm-print | 1.2 | |
eq-3 | homematic_ccu2 | - | |
eq-3 | homematic_ccu2_firmware | 2.47.20 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hm-print_project:hm-print:1.2a:*:*:*:*:*:*:*", "matchCriteriaId": "286DA904-5631-4AAF-86DE-97C23982D2C5", "vulnerable": true }, { "criteria": "cpe:2.3:h:eq-3:homematic_ccu2:-:*:*:*:*:*:*:*", "matchCriteriaId": "9C2CF19C-7EDE-4E3C-A736-E6736FF03FDC", "vulnerable": false }, { "criteria": "cpe:2.3:o:eq-3:homematic_ccu2_firmware:2.47.20:*:*:*:*:*:*:*", "matchCriteriaId": "38BE17DA-7C5E-427E-B824-151EB27CFF26", "vulnerable": true } ], "negate": false, "operator": "AND" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hm-print_project:hm-print:1.2:*:*:*:*:*:*:*", "matchCriteriaId": "F5D8290F-3541-4452-99CB-0766CDC59073", "vulnerable": true }, { "criteria": "cpe:2.3:h:eq-3:homematic_ccu3:-:*:*:*:*:*:*:*", "matchCriteriaId": "33113AD0-F378-49B2-BCFC-C57B52FD3A04", "vulnerable": false }, { "criteria": "cpe:2.3:o:eq-3:homematic_ccu3_firmware:3.47.18:*:*:*:*:*:*:*", "matchCriteriaId": "285F4E29-E299-4F83-9F7E-BB19933AD654", "vulnerable": true } ], "negate": false, "operator": "AND" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hm-print_project:hm-print:1.2a:*:*:*:*:*:*:*", "matchCriteriaId": "286DA904-5631-4AAF-86DE-97C23982D2C5", "vulnerable": true }, { "criteria": "cpe:2.3:h:eq-3:homematic_ccu3:-:*:*:*:*:*:*:*", "matchCriteriaId": "33113AD0-F378-49B2-BCFC-C57B52FD3A04", "vulnerable": false }, { "criteria": "cpe:2.3:o:eq-3:homematic_ccu3_firmware:3.47.18:*:*:*:*:*:*:*", "matchCriteriaId": "285F4E29-E299-4F83-9F7E-BB19933AD654", "vulnerable": true } ], "negate": false, "operator": "AND" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hm-print_project:hm-print:1.2:*:*:*:*:*:*:*", "matchCriteriaId": "F5D8290F-3541-4452-99CB-0766CDC59073", "vulnerable": true }, { "criteria": "cpe:2.3:h:eq-3:homematic_ccu2:-:*:*:*:*:*:*:*", "matchCriteriaId": "9C2CF19C-7EDE-4E3C-A736-E6736FF03FDC", "vulnerable": false }, { "criteria": "cpe:2.3:o:eq-3:homematic_ccu2_firmware:2.47.20:*:*:*:*:*:*:*", "matchCriteriaId": "38BE17DA-7C5E-427E-B824-151EB27CFF26", "vulnerable": true } ], "negate": false, "operator": "AND" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "eQ-3 Homematic CCU2 2.47.20 and CCU3 3.47.18 with the HM-Print AddOn through 1.2a installed allow Remote Code Execution by unauthenticated attackers with access to the web interface via the exec.cgi and exec1.cgi scripts, which execute TCL script content from an HTTP POST request." }, { "lang": "es", "value": "eQ-3 Homematic CCU2 versi\u00f3n 2.47.20 y CCU3 versi\u00f3n 3.47.18 con el AddOn HM-Print instalado versiones hasta 1.2a, permite la Ejecuci\u00f3n de C\u00f3digo Remota por parte de atacantes no autenticados con acceso a la interfaz web por medio de los scripts exec.cgi y exec1.cgi, que ejecutan un contenido de script TCL desde una petici\u00f3n POST de HTTP." } ], "id": "CVE-2019-18939", "lastModified": "2024-11-21T04:33:52.900", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-11-14T19:15:13.410", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://psytester.github.io/CVE-2019-18939/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://psytester.github.io/CVE-2019-18939/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-306" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-08-14 21:15
Modified
2024-11-21 04:51
Severity ?
Summary
eQ-3 Homematic AddOn 'CloudMatic' on CCU2 and CCU3 allows uncontrolled admin access, resulting in the ability to obtain VPN profile details, shutting down the VPN service and to delete the VPN service configuration. This is related to improper access control for all /addons/mh/ pages.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://github.com/psytester/psytester.github.io/blob/master/_posts/hacking_and_pentests/CVEs/2019-03-27-CVE-2019-9584.md | Exploit, Third Party Advisory | |
cve@mitre.org | https://psytester.github.io/CVE-2019-9584/ | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/psytester/psytester.github.io/blob/master/_posts/hacking_and_pentests/CVEs/2019-03-27-CVE-2019-9584.md | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://psytester.github.io/CVE-2019-9584/ | Exploit, Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
eq-3 | homematic_ccu2_firmware | * | |
eq-3 | homematic_ccu2 | - | |
eq-3 | homematic_ccu3_firmware | * | |
eq-3 | homematic_ccu3 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:eq-3:homematic_ccu2_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3DFCA73A-99D9-434E-83C3-2771EC8E02C7", "versionEndIncluding": "2.47.15", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:eq-3:homematic_ccu2:-:*:*:*:*:*:*:*", "matchCriteriaId": "9C2CF19C-7EDE-4E3C-A736-E6736FF03FDC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:eq-3:homematic_ccu3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6FBF4062-DFA4-4E3F-B7A6-791D44C446C5", "versionEndIncluding": "3.47.15", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:eq-3:homematic_ccu3:-:*:*:*:*:*:*:*", "matchCriteriaId": "33113AD0-F378-49B2-BCFC-C57B52FD3A04", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "eQ-3 Homematic AddOn \u0027CloudMatic\u0027 on CCU2 and CCU3 allows uncontrolled admin access, resulting in the ability to obtain VPN profile details, shutting down the VPN service and to delete the VPN service configuration. This is related to improper access control for all /addons/mh/ pages." }, { "lang": "es", "value": "eQ-3 Homematic AddOn \"CloudMatic\" sobre CCU2 y CCU3, permite acceso de administrador no controlado, resultando en la capacidad de obtener detalles del perfil VPN, cerrar el servicio VPN y eliminar la configuraci\u00f3n del servicio VPN. Esto est\u00e1 relacionado con un control de acceso inapropiado para todas las p\u00e1ginas /addons/mh/." } ], "id": "CVE-2019-9584", "lastModified": "2024-11-21T04:51:54.330", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-08-14T21:15:19.250", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/psytester/psytester.github.io/blob/master/_posts/hacking_and_pentests/CVEs/2019-03-27-CVE-2019-9584.md" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://psytester.github.io/CVE-2019-9584/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/psytester/psytester.github.io/blob/master/_posts/hacking_and_pentests/CVEs/2019-03-27-CVE-2019-9584.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://psytester.github.io/CVE-2019-9584/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-425" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-05-15 17:15
Modified
2024-11-21 05:00
Severity ?
Summary
eQ-3 Homematic Central Control Unit (CCU)2 through 2.51.6 and CCU3 through 3.51.6 allow Remote Code Execution in the JSON API Method ReGa.runScript, by unauthenticated attackers with access to the web interface, due to the default auto-login feature being enabled during first-time setup (or factory reset).
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://psytester.github.io/CVE-2020-12834/ | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://psytester.github.io/CVE-2020-12834/ | Exploit, Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
eq-3 | homematic_ccu2_firmware | * | |
eq-3 | homematic_ccu2 | - | |
eq-3 | ccu3_firmware | * | |
eq-3 | homematic_ccu3 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:eq-3:homematic_ccu2_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "01848E5D-7A8C-4DAD-967D-E29FB129C2EF", "versionEndIncluding": "2.51.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:eq-3:homematic_ccu2:-:*:*:*:*:*:*:*", "matchCriteriaId": "9C2CF19C-7EDE-4E3C-A736-E6736FF03FDC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:eq-3:ccu3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "62962D0F-9A5C-4A4A-81CE-1D0A0B54434F", "versionEndIncluding": "3.51.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:eq-3:homematic_ccu3:-:*:*:*:*:*:*:*", "matchCriteriaId": "33113AD0-F378-49B2-BCFC-C57B52FD3A04", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "eQ-3 Homematic Central Control Unit (CCU)2 through 2.51.6 and CCU3 through 3.51.6 allow Remote Code Execution in the JSON API Method ReGa.runScript, by unauthenticated attackers with access to the web interface, due to the default auto-login feature being enabled during first-time setup (or factory reset)." }, { "lang": "es", "value": "eQ-3 Homematic Central Control Unit (CCU)2 versiones hasta 2.51.6 y la CCU3 versiones hasta 3.51.6, permiten una ejecuci\u00f3n de c\u00f3digo remota en el JSON API Method ReGa.runScript, por parte de atacantes no autenticados con acceso a la interfaz web, debido a que la funcionalidad auto-login predeterminada est\u00e1 activada durante la configuraci\u00f3n por primera vez (o el restablecimiento de f\u00e1brica)." } ], "id": "CVE-2020-12834", "lastModified": "2024-11-21T05:00:22.087", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-05-15T17:15:12.500", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://psytester.github.io/CVE-2020-12834/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://psytester.github.io/CVE-2020-12834/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-276" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-11-14 19:15
Modified
2024-11-21 04:33
Severity ?
Summary
eQ-3 Homematic CCU2 2.47.20 and CCU3 3.47.18 with the Script Parser AddOn through 1.8 installed allow Remote Code Execution by unauthenticated attackers with access to the web interface via the exec.cgi script, which executes TCL script content from an HTTP POST request.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://psytester.github.io/CVE-2019-18937/ | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://psytester.github.io/CVE-2019-18937/ | Exploit, Third Party Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:scriptparser_project:scriptparser:1.8:*:*:*:*:*:*:*", "matchCriteriaId": "AF7BA00E-B37D-4B57-8A8E-B97535AE7824", "vulnerable": true }, { "criteria": "cpe:2.3:h:eq-3:homematic_ccu2:-:*:*:*:*:*:*:*", "matchCriteriaId": "9C2CF19C-7EDE-4E3C-A736-E6736FF03FDC", "vulnerable": false }, { "criteria": "cpe:2.3:o:eq-3:homematic_ccu2_firmware:2.47.20:*:*:*:*:*:*:*", "matchCriteriaId": "38BE17DA-7C5E-427E-B824-151EB27CFF26", "vulnerable": true } ], "negate": false, "operator": "AND" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:scriptparser_project:scriptparser:1.8:*:*:*:*:*:*:*", "matchCriteriaId": "AF7BA00E-B37D-4B57-8A8E-B97535AE7824", "vulnerable": true }, { "criteria": "cpe:2.3:h:eq-3:homematic_ccu3:-:*:*:*:*:*:*:*", "matchCriteriaId": "33113AD0-F378-49B2-BCFC-C57B52FD3A04", "vulnerable": false }, { "criteria": "cpe:2.3:o:eq-3:homematic_ccu3_firmware:3.47.18:*:*:*:*:*:*:*", "matchCriteriaId": "285F4E29-E299-4F83-9F7E-BB19933AD654", "vulnerable": true } ], "negate": false, "operator": "AND" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:scriptparser_project:scriptparser:1.7:*:*:*:*:*:*:*", "matchCriteriaId": "73E20DD3-4661-43C3-9393-B73FEB2FCD86", "vulnerable": true }, { "criteria": "cpe:2.3:h:eq-3:homematic_ccu3:-:*:*:*:*:*:*:*", "matchCriteriaId": "33113AD0-F378-49B2-BCFC-C57B52FD3A04", "vulnerable": false }, { "criteria": "cpe:2.3:o:eq-3:homematic_ccu3_firmware:3.47.18:*:*:*:*:*:*:*", "matchCriteriaId": "285F4E29-E299-4F83-9F7E-BB19933AD654", "vulnerable": true } ], "negate": false, "operator": "AND" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:scriptparser_project:scriptparser:1.7:*:*:*:*:*:*:*", "matchCriteriaId": "73E20DD3-4661-43C3-9393-B73FEB2FCD86", "vulnerable": true }, { "criteria": "cpe:2.3:h:eq-3:homematic_ccu2:-:*:*:*:*:*:*:*", "matchCriteriaId": "9C2CF19C-7EDE-4E3C-A736-E6736FF03FDC", "vulnerable": false }, { "criteria": "cpe:2.3:o:eq-3:homematic_ccu2_firmware:2.47.20:*:*:*:*:*:*:*", "matchCriteriaId": "38BE17DA-7C5E-427E-B824-151EB27CFF26", "vulnerable": true } ], "negate": false, "operator": "AND" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:scriptparser_project:scriptparser:1.6:*:*:*:*:*:*:*", "matchCriteriaId": "AA60BB4B-71D9-453A-BDA6-3B2A5F18AD42", "vulnerable": true }, { "criteria": "cpe:2.3:h:eq-3:homematic_ccu2:-:*:*:*:*:*:*:*", "matchCriteriaId": "9C2CF19C-7EDE-4E3C-A736-E6736FF03FDC", "vulnerable": false }, { "criteria": "cpe:2.3:o:eq-3:homematic_ccu2_firmware:2.47.20:*:*:*:*:*:*:*", "matchCriteriaId": "38BE17DA-7C5E-427E-B824-151EB27CFF26", "vulnerable": true } ], "negate": false, "operator": "AND" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:scriptparser_project:scriptparser:1.5:*:*:*:*:*:*:*", "matchCriteriaId": "D88DEE93-7D32-4ED1-AA27-9A2FBB2F9BE9", "vulnerable": true }, { "criteria": "cpe:2.3:h:eq-3:homematic_ccu2:-:*:*:*:*:*:*:*", "matchCriteriaId": "9C2CF19C-7EDE-4E3C-A736-E6736FF03FDC", "vulnerable": false }, { "criteria": "cpe:2.3:o:eq-3:homematic_ccu2_firmware:2.47.20:*:*:*:*:*:*:*", "matchCriteriaId": "38BE17DA-7C5E-427E-B824-151EB27CFF26", "vulnerable": true } ], "negate": false, "operator": "AND" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:scriptparser_project:scriptparser:1.4:*:*:*:*:*:*:*", "matchCriteriaId": "7326D55B-8DF1-42B2-96DD-263CCD86E6D1", "vulnerable": true }, { "criteria": "cpe:2.3:h:eq-3:homematic_ccu2:-:*:*:*:*:*:*:*", "matchCriteriaId": "9C2CF19C-7EDE-4E3C-A736-E6736FF03FDC", "vulnerable": false }, { "criteria": "cpe:2.3:o:eq-3:homematic_ccu2_firmware:2.47.20:*:*:*:*:*:*:*", "matchCriteriaId": "38BE17DA-7C5E-427E-B824-151EB27CFF26", "vulnerable": true } ], "negate": false, "operator": "AND" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:scriptparser_project:scriptparser:1.3:*:*:*:*:*:*:*", "matchCriteriaId": "BEBE241F-E464-4678-8B56-7F212A072A7D", "vulnerable": true }, { "criteria": "cpe:2.3:h:eq-3:homematic_ccu2:-:*:*:*:*:*:*:*", "matchCriteriaId": "9C2CF19C-7EDE-4E3C-A736-E6736FF03FDC", "vulnerable": false }, { "criteria": "cpe:2.3:o:eq-3:homematic_ccu2_firmware:2.47.20:*:*:*:*:*:*:*", "matchCriteriaId": "38BE17DA-7C5E-427E-B824-151EB27CFF26", "vulnerable": true } ], "negate": false, "operator": "AND" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:scriptparser_project:scriptparser:1.3:beta1:*:*:*:*:*:*", "matchCriteriaId": "0EC54A24-1F1B-47FB-A4F7-AA30BFD98CD3", "vulnerable": true }, { "criteria": "cpe:2.3:h:eq-3:homematic_ccu2:-:*:*:*:*:*:*:*", "matchCriteriaId": "9C2CF19C-7EDE-4E3C-A736-E6736FF03FDC", "vulnerable": false }, { "criteria": "cpe:2.3:o:eq-3:homematic_ccu2_firmware:2.47.20:*:*:*:*:*:*:*", "matchCriteriaId": "38BE17DA-7C5E-427E-B824-151EB27CFF26", "vulnerable": true } ], "negate": false, "operator": "AND" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:scriptparser_project:scriptparser:1.2:*:*:*:*:*:*:*", "matchCriteriaId": "3EB7F49C-306B-4731-B4A0-4630D1FC2388", "vulnerable": true }, { "criteria": "cpe:2.3:h:eq-3:homematic_ccu2:-:*:*:*:*:*:*:*", "matchCriteriaId": "9C2CF19C-7EDE-4E3C-A736-E6736FF03FDC", "vulnerable": false }, { "criteria": "cpe:2.3:o:eq-3:homematic_ccu2_firmware:2.47.20:*:*:*:*:*:*:*", "matchCriteriaId": "38BE17DA-7C5E-427E-B824-151EB27CFF26", "vulnerable": true } ], "negate": false, "operator": "AND" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:scriptparser_project:scriptparser:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "3FF15D38-6E95-4DAC-9F5E-35563A40929F", "vulnerable": true }, { "criteria": "cpe:2.3:h:eq-3:homematic_ccu2:-:*:*:*:*:*:*:*", "matchCriteriaId": "9C2CF19C-7EDE-4E3C-A736-E6736FF03FDC", "vulnerable": false }, { "criteria": "cpe:2.3:o:eq-3:homematic_ccu2_firmware:2.47.20:*:*:*:*:*:*:*", "matchCriteriaId": "38BE17DA-7C5E-427E-B824-151EB27CFF26", "vulnerable": true } ], "negate": false, "operator": "AND" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:scriptparser_project:scriptparser:1.6:*:*:*:*:*:*:*", "matchCriteriaId": "AA60BB4B-71D9-453A-BDA6-3B2A5F18AD42", "vulnerable": true }, { "criteria": "cpe:2.3:h:eq-3:homematic_ccu3:-:*:*:*:*:*:*:*", "matchCriteriaId": "33113AD0-F378-49B2-BCFC-C57B52FD3A04", "vulnerable": false }, { "criteria": "cpe:2.3:o:eq-3:homematic_ccu3_firmware:3.47.18:*:*:*:*:*:*:*", "matchCriteriaId": "285F4E29-E299-4F83-9F7E-BB19933AD654", "vulnerable": true } ], "negate": false, "operator": "AND" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:scriptparser_project:scriptparser:1.5:*:*:*:*:*:*:*", "matchCriteriaId": "D88DEE93-7D32-4ED1-AA27-9A2FBB2F9BE9", "vulnerable": true }, { "criteria": "cpe:2.3:h:eq-3:homematic_ccu3:-:*:*:*:*:*:*:*", "matchCriteriaId": "33113AD0-F378-49B2-BCFC-C57B52FD3A04", "vulnerable": false }, { "criteria": "cpe:2.3:o:eq-3:homematic_ccu3_firmware:3.47.18:*:*:*:*:*:*:*", "matchCriteriaId": "285F4E29-E299-4F83-9F7E-BB19933AD654", "vulnerable": true } ], "negate": false, "operator": "AND" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:scriptparser_project:scriptparser:1.4:*:*:*:*:*:*:*", "matchCriteriaId": "7326D55B-8DF1-42B2-96DD-263CCD86E6D1", "vulnerable": true }, { "criteria": "cpe:2.3:h:eq-3:homematic_ccu3:-:*:*:*:*:*:*:*", "matchCriteriaId": "33113AD0-F378-49B2-BCFC-C57B52FD3A04", "vulnerable": false }, { "criteria": "cpe:2.3:o:eq-3:homematic_ccu3_firmware:3.47.18:*:*:*:*:*:*:*", "matchCriteriaId": "285F4E29-E299-4F83-9F7E-BB19933AD654", "vulnerable": true } ], "negate": false, "operator": "AND" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:scriptparser_project:scriptparser:1.3:*:*:*:*:*:*:*", "matchCriteriaId": "BEBE241F-E464-4678-8B56-7F212A072A7D", "vulnerable": true }, { "criteria": "cpe:2.3:h:eq-3:homematic_ccu3:-:*:*:*:*:*:*:*", "matchCriteriaId": "33113AD0-F378-49B2-BCFC-C57B52FD3A04", "vulnerable": false }, { "criteria": "cpe:2.3:o:eq-3:homematic_ccu3_firmware:3.47.18:*:*:*:*:*:*:*", "matchCriteriaId": "285F4E29-E299-4F83-9F7E-BB19933AD654", "vulnerable": true } ], "negate": false, "operator": "AND" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:scriptparser_project:scriptparser:1.3:beta1:*:*:*:*:*:*", "matchCriteriaId": "0EC54A24-1F1B-47FB-A4F7-AA30BFD98CD3", "vulnerable": true }, { "criteria": "cpe:2.3:h:eq-3:homematic_ccu3:-:*:*:*:*:*:*:*", "matchCriteriaId": "33113AD0-F378-49B2-BCFC-C57B52FD3A04", "vulnerable": false }, { "criteria": "cpe:2.3:o:eq-3:homematic_ccu3_firmware:3.47.18:*:*:*:*:*:*:*", "matchCriteriaId": "285F4E29-E299-4F83-9F7E-BB19933AD654", "vulnerable": true } ], "negate": false, "operator": "AND" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:scriptparser_project:scriptparser:1.2:*:*:*:*:*:*:*", "matchCriteriaId": "3EB7F49C-306B-4731-B4A0-4630D1FC2388", "vulnerable": true }, { "criteria": "cpe:2.3:h:eq-3:homematic_ccu3:-:*:*:*:*:*:*:*", "matchCriteriaId": "33113AD0-F378-49B2-BCFC-C57B52FD3A04", "vulnerable": false }, { "criteria": "cpe:2.3:o:eq-3:homematic_ccu3_firmware:3.47.18:*:*:*:*:*:*:*", "matchCriteriaId": "285F4E29-E299-4F83-9F7E-BB19933AD654", "vulnerable": true } ], "negate": false, "operator": "AND" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:scriptparser_project:scriptparser:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "3FF15D38-6E95-4DAC-9F5E-35563A40929F", "vulnerable": true }, { "criteria": "cpe:2.3:h:eq-3:homematic_ccu3:-:*:*:*:*:*:*:*", "matchCriteriaId": "33113AD0-F378-49B2-BCFC-C57B52FD3A04", "vulnerable": false }, { "criteria": "cpe:2.3:o:eq-3:homematic_ccu3_firmware:3.47.18:*:*:*:*:*:*:*", "matchCriteriaId": "285F4E29-E299-4F83-9F7E-BB19933AD654", "vulnerable": true } ], "negate": false, "operator": "AND" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "eQ-3 Homematic CCU2 2.47.20 and CCU3 3.47.18 with the Script Parser AddOn through 1.8 installed allow Remote Code Execution by unauthenticated attackers with access to the web interface via the exec.cgi script, which executes TCL script content from an HTTP POST request." }, { "lang": "es", "value": "eQ-3 Homematic CCU2 versi\u00f3n 2.47.20 y CCU3 versi\u00f3n 3.47.18 con el AddOn Script Parser instalado versiones hasta 1.8, permite una Ejecuci\u00f3n de C\u00f3digo Remota por parte de atacantes no autenticados con acceso a la interfaz web por medio de l script exec.cgi, que ejecuta un contenido de script TCL desde una petici\u00f3n POST de HTTP." } ], "id": "CVE-2019-18937", "lastModified": "2024-11-21T04:33:52.567", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-11-14T19:15:13.237", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://psytester.github.io/CVE-2019-18937/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://psytester.github.io/CVE-2019-18937/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-306" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-08-14 20:15
Modified
2024-11-21 04:51
Severity ?
Summary
eQ-3 Homematic CCU2 and CCU3 obtain session IDs without login. This allows a Denial of Service and is a starting point for other attacks. Affected versions for CCU2: 2.35.16, 2.41.5, 2.41.8, 2.41.9, 2.45.6, 2.45.7, 2.47.10, 2.47.12, 2.47.15. Affected versions for CCU3: 3.41.11, 3.43.16, 3.45.5, 3.45.7, 3.47.10, 3.47.15.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://github.com/psytester/psytester.github.io/blob/master/_posts/hacking_and_pentests/CVEs/2019-03-27-CVE-2019-9583.md | Exploit, Third Party Advisory | |
cve@mitre.org | https://psytester.github.io/CVE-2019-9583/ | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/psytester/psytester.github.io/blob/master/_posts/hacking_and_pentests/CVEs/2019-03-27-CVE-2019-9583.md | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://psytester.github.io/CVE-2019-9583/ | Exploit, Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
eq-3 | homematic_ccu3_firmware | 3.41.11 | |
eq-3 | homematic_ccu3_firmware | 3.43.16 | |
eq-3 | homematic_ccu3_firmware | 3.45.5 | |
eq-3 | homematic_ccu3_firmware | 3.45.7 | |
eq-3 | homematic_ccu3_firmware | 3.47.10 | |
eq-3 | homematic_ccu3_firmware | 3.47.15 | |
eq-3 | homematic_ccu3 | - | |
eq-3 | homematic_ccu2_firmware | - | |
eq-3 | homematic_ccu2_firmware | 2.35.16 | |
eq-3 | homematic_ccu2_firmware | 2.41.5 | |
eq-3 | homematic_ccu2_firmware | 2.41.8 | |
eq-3 | homematic_ccu2_firmware | 2.41.9 | |
eq-3 | homematic_ccu2_firmware | 2.45.6 | |
eq-3 | homematic_ccu2_firmware | 2.45.7 | |
eq-3 | homematic_ccu2_firmware | 2.47.10 | |
eq-3 | homematic_ccu2_firmware | 2.47.12 | |
eq-3 | homematic_ccu2_firmware | 2.47.15 | |
eq-3 | homematic_ccu2 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:eq-3:homematic_ccu3_firmware:3.41.11:*:*:*:*:*:*:*", "matchCriteriaId": "F63AD6F8-1BE7-481B-BDDE-45234840B530", "vulnerable": true }, { "criteria": "cpe:2.3:o:eq-3:homematic_ccu3_firmware:3.43.16:*:*:*:*:*:*:*", "matchCriteriaId": "ED2A0030-E46B-42EE-B545-1D04D46F3FB5", "vulnerable": true }, { "criteria": "cpe:2.3:o:eq-3:homematic_ccu3_firmware:3.45.5:*:*:*:*:*:*:*", "matchCriteriaId": "E2C1A46E-178C-4893-A172-6D081D9BAA67", "vulnerable": true }, { "criteria": "cpe:2.3:o:eq-3:homematic_ccu3_firmware:3.45.7:*:*:*:*:*:*:*", "matchCriteriaId": "75BE927B-CD17-4293-A440-8DD29C8CD23E", "vulnerable": true }, { "criteria": "cpe:2.3:o:eq-3:homematic_ccu3_firmware:3.47.10:*:*:*:*:*:*:*", "matchCriteriaId": "D4E76C1E-A745-4BEA-B3B2-2B613DA4FCC5", "vulnerable": true }, { "criteria": "cpe:2.3:o:eq-3:homematic_ccu3_firmware:3.47.15:*:*:*:*:*:*:*", "matchCriteriaId": "96CA7522-DB7E-4F61-BD85-A8F665AFC697", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:eq-3:homematic_ccu3:-:*:*:*:*:*:*:*", "matchCriteriaId": "33113AD0-F378-49B2-BCFC-C57B52FD3A04", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:eq-3:homematic_ccu2_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "AC8E6D04-7E53-4471-A20F-66C974B5B751", "vulnerable": true }, { "criteria": "cpe:2.3:o:eq-3:homematic_ccu2_firmware:2.35.16:*:*:*:*:*:*:*", "matchCriteriaId": "2313AB9D-E18F-4603-8CE5-D0C3D9660785", "vulnerable": true }, { "criteria": "cpe:2.3:o:eq-3:homematic_ccu2_firmware:2.41.5:*:*:*:*:*:*:*", "matchCriteriaId": "CFE9F1F1-70FB-470C-8455-201797CA50D5", "vulnerable": true }, { "criteria": "cpe:2.3:o:eq-3:homematic_ccu2_firmware:2.41.8:*:*:*:*:*:*:*", "matchCriteriaId": "1CE5BE83-688F-4188-844F-328C846D90C2", "vulnerable": true }, { "criteria": "cpe:2.3:o:eq-3:homematic_ccu2_firmware:2.41.9:*:*:*:*:*:*:*", "matchCriteriaId": "592EDF0E-792F-4DEC-9926-E33675C5C7C9", "vulnerable": true }, { "criteria": "cpe:2.3:o:eq-3:homematic_ccu2_firmware:2.45.6:*:*:*:*:*:*:*", "matchCriteriaId": "38DF6345-9A75-4E5C-9BEC-CB6A0767E739", "vulnerable": true }, { "criteria": "cpe:2.3:o:eq-3:homematic_ccu2_firmware:2.45.7:*:*:*:*:*:*:*", "matchCriteriaId": "C1FA10A6-D09E-44EC-ABEB-49CFA8780456", "vulnerable": true }, { "criteria": "cpe:2.3:o:eq-3:homematic_ccu2_firmware:2.47.10:*:*:*:*:*:*:*", "matchCriteriaId": "E02A84D1-C6F6-4DE0-88A3-85F41A90D9EB", "vulnerable": true }, { "criteria": "cpe:2.3:o:eq-3:homematic_ccu2_firmware:2.47.12:*:*:*:*:*:*:*", "matchCriteriaId": "84030C3C-ED0D-4CB5-863C-F5663AE4AFE1", "vulnerable": true }, { "criteria": "cpe:2.3:o:eq-3:homematic_ccu2_firmware:2.47.15:*:*:*:*:*:*:*", "matchCriteriaId": "F03E1DE6-70FF-4EE9-A3E2-44020B64ADDB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:eq-3:homematic_ccu2:-:*:*:*:*:*:*:*", "matchCriteriaId": "9C2CF19C-7EDE-4E3C-A736-E6736FF03FDC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "eQ-3 Homematic CCU2 and CCU3 obtain session IDs without login. This allows a Denial of Service and is a starting point for other attacks. Affected versions for CCU2: 2.35.16, 2.41.5, 2.41.8, 2.41.9, 2.45.6, 2.45.7, 2.47.10, 2.47.12, 2.47.15. Affected versions for CCU3: 3.41.11, 3.43.16, 3.45.5, 3.45.7, 3.47.10, 3.47.15." }, { "lang": "es", "value": "eQ-3 Homematic CCU2 y CCU3 obtienen los IDs de sesi\u00f3n sin iniciar sesi\u00f3n. Esto permite una denegaci\u00f3n de servicio y es un punto de partida para otros ataques. Versiones afectadas para CCU2: 2.35.16, 2.41.5, 2.41.8, 2.41.9, 2.45.6, 2.45.7, 2.47.10, 2.47.12, 2.47.15. Versiones afectadas para CCU3: 3.41.11, 3.43.16, 3.45.5, 3.45.7, 3.47.10, 3.47.15." } ], "id": "CVE-2019-9583", "lastModified": "2024-11-21T04:51:54.180", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 4.2, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-08-14T20:15:11.790", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/psytester/psytester.github.io/blob/master/_posts/hacking_and_pentests/CVEs/2019-03-27-CVE-2019-9583.md" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://psytester.github.io/CVE-2019-9583/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/psytester/psytester.github.io/blob/master/_posts/hacking_and_pentests/CVEs/2019-03-27-CVE-2019-9583.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://psytester.github.io/CVE-2019-9583/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-400" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-08-14 21:15
Modified
2024-11-21 04:51
Severity ?
Summary
eQ-3 Homematic CCU2 prior to 2.47.10 and CCU3 prior to 3.47.10 JSON API has Improper Access Control for Interface.***Metadata related operations, resulting in the ability to read, set and deletion of Metadata.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://github.com/psytester/psytester.github.io/blob/master/_posts/hacking_and_pentests/CVEs/2019-03-27-CVE-2019-9585.md | Exploit, Third Party Advisory | |
cve@mitre.org | https://psytester.github.io/CVE-2019-9585/ | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/psytester/psytester.github.io/blob/master/_posts/hacking_and_pentests/CVEs/2019-03-27-CVE-2019-9585.md | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://psytester.github.io/CVE-2019-9585/ | Exploit, Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
eq-3 | homematic_ccu2_firmware | * | |
eq-3 | homematic_ccu2 | - | |
eq-3 | homematic_ccu3_firmware | * | |
eq-3 | homematic_ccu3 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:eq-3:homematic_ccu2_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "467F558A-79F4-4841-B418-48A3D271FCF8", "versionEndExcluding": "2.47.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:eq-3:homematic_ccu2:-:*:*:*:*:*:*:*", "matchCriteriaId": "9C2CF19C-7EDE-4E3C-A736-E6736FF03FDC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:eq-3:homematic_ccu3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8BE88805-1480-4D1B-8EDF-48091435CD94", "versionEndExcluding": "3.47.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:eq-3:homematic_ccu3:-:*:*:*:*:*:*:*", "matchCriteriaId": "33113AD0-F378-49B2-BCFC-C57B52FD3A04", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "eQ-3 Homematic CCU2 prior to 2.47.10 and CCU3 prior to 3.47.10 JSON API has Improper Access Control for Interface.***Metadata related operations, resulting in the ability to read, set and deletion of Metadata." }, { "lang": "es", "value": "eQ-3 Homematic CCU2 versiones anteriores a 2.47.10 y CCU3 versiones anteriores a 3.47.10, la API JSON tiene un control de acceso inapropiado para la interfaz. ***Operaciones relacionadas con metadatos, resultan en la capacidad para leer, establecer y eliminar metadatos." } ], "id": "CVE-2019-9585", "lastModified": "2024-11-21T04:51:54.477", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-08-14T21:15:19.347", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/psytester/psytester.github.io/blob/master/_posts/hacking_and_pentests/CVEs/2019-03-27-CVE-2019-9585.md" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://psytester.github.io/CVE-2019-9585/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/psytester/psytester.github.io/blob/master/_posts/hacking_and_pentests/CVEs/2019-03-27-CVE-2019-9585.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://psytester.github.io/CVE-2019-9585/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-306" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-08-13 20:15
Modified
2024-11-21 04:27
Severity ?
Summary
eQ-3 Homematic CCU2 and CCU3 with the CUxD AddOn before 2.3.0 installed allow administrative operations by unauthenticated attackers with access to the web interface, because features such as File-Browser and Shell Command (as well as "Set root password") are exposed.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://psytester.github.io/CVE-2019-14986/ | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://psytester.github.io/CVE-2019-14986/ | Exploit, Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
eq-3 | homematic_ccu2_firmware | * | |
eq-3 | homematic_ccu2 | - | |
eq-3 | homematic_ccu3_firmware | * | |
eq-3 | homematic_ccu3 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:eq-3:homematic_ccu2_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5DD3D92D-5877-4F7A-AC5F-5EF9217740BB", "versionEndExcluding": "2.3.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:eq-3:homematic_ccu2:-:*:*:*:*:*:*:*", "matchCriteriaId": "9C2CF19C-7EDE-4E3C-A736-E6736FF03FDC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:eq-3:homematic_ccu3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3F572C5A-63CF-4E61-970C-3DC339860068", "versionEndExcluding": "2.3.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:eq-3:homematic_ccu3:-:*:*:*:*:*:*:*", "matchCriteriaId": "33113AD0-F378-49B2-BCFC-C57B52FD3A04", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "eQ-3 Homematic CCU2 and CCU3 with the CUxD AddOn before 2.3.0 installed allow administrative operations by unauthenticated attackers with access to the web interface, because features such as File-Browser and Shell Command (as well as \"Set root password\") are exposed." }, { "lang": "es", "value": "eQ-3 Homematic CCU2 y CCU3 con el complemento CUxD antes de 2.3.0 instalado permiten operaciones administrativas por parte de atacantes no autenticados con acceso a la interfaz web, porque funciones como File-Browser y Shell Command (as\u00ed como \"Establecer contrase\u00f1a de root\") son expuesto." } ], "id": "CVE-2019-14986", "lastModified": "2024-11-21T04:27:49.757", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-08-13T20:15:12.307", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://psytester.github.io/CVE-2019-14986/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://psytester.github.io/CVE-2019-14986/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-09-17 21:15
Modified
2024-11-21 04:30
Severity ?
Summary
eQ-3 Homematic CCU2 before 2.47.18 and CCU3 before 3.47.18 allow Remote Code Execution by unauthenticated attackers with access to the web interface via an HTTP POST request to certain URLs related to the ReGa core process.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://psytester.github.io/CVE-2019-16199/ | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://psytester.github.io/CVE-2019-16199/ | Exploit, Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
eq-3 | homematic_ccu2_firmware | * | |
eq-3 | homematic_ccu2 | - | |
eq-3 | homematic_ccu3_firmware | * | |
eq-3 | homematic_ccu3 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:eq-3:homematic_ccu2_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "836EC6F5-B5B2-4E82-8EF8-639EFF81344B", "versionEndExcluding": "2.47.18", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:eq-3:homematic_ccu2:-:*:*:*:*:*:*:*", "matchCriteriaId": "9C2CF19C-7EDE-4E3C-A736-E6736FF03FDC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:eq-3:homematic_ccu3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7B3D8D5A-1B1D-494D-AFE6-3E0E4803696E", "versionEndExcluding": "3.47.18", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:eq-3:homematic_ccu3:-:*:*:*:*:*:*:*", "matchCriteriaId": "33113AD0-F378-49B2-BCFC-C57B52FD3A04", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "eQ-3 Homematic CCU2 before 2.47.18 and CCU3 before 3.47.18 allow Remote Code Execution by unauthenticated attackers with access to the web interface via an HTTP POST request to certain URLs related to the ReGa core process." }, { "lang": "es", "value": "eQ-3 Homematic CCU2 versiones anteriores a 2.47.18 y CCU3 versiones anteriores a 3.47.18, permiten la ejecuci\u00f3n de c\u00f3digo remota por parte de atacantes no autenticados con acceso a la interfaz web por medio" } ], "id": "CVE-2019-16199", "lastModified": "2024-11-21T04:30:15.433", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-09-17T21:15:11.163", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://psytester.github.io/CVE-2019-16199/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://psytester.github.io/CVE-2019-16199/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-306" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-08-13 20:15
Modified
2024-11-21 04:27
Severity ?
Summary
eQ-3 Homematic CCU2 and CCU3 with the CUxD AddOn installed allow Remote Code Execution by unauthenticated attackers with access to the web interface, because this interface can access the CMD_EXEC virtual device type 28.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://psytester.github.io/CVE-2019-14985/ | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://psytester.github.io/CVE-2019-14985/ | Exploit, Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
eq-3 | homematic_ccu2_firmware | 2.35.16 | |
eq-3 | homematic_ccu2_firmware | 2.41.5 | |
eq-3 | homematic_ccu2_firmware | 2.41.8 | |
eq-3 | homematic_ccu2_firmware | 2.41.9 | |
eq-3 | homematic_ccu2_firmware | 2.45.6 | |
eq-3 | homematic_ccu2_firmware | 2.45.7 | |
eq-3 | homematic_ccu2_firmware | 2.47.10 | |
eq-3 | homematic_ccu2_firmware | 2.47.12 | |
eq-3 | homematic_ccu2_firmware | 2.47.15 | |
eq-3 | homematic_ccu2 | - | |
eq-3 | homematic_ccu3_firmware | 3.41.11 | |
eq-3 | homematic_ccu3_firmware | 3.43.16 | |
eq-3 | homematic_ccu3_firmware | 3.45.5 | |
eq-3 | homematic_ccu3_firmware | 3.45.7 | |
eq-3 | homematic_ccu3_firmware | 3.47.10 | |
eq-3 | homematic_ccu3_firmware | 3.47.15 | |
eq-3 | homematic_ccu3 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:eq-3:homematic_ccu2_firmware:2.35.16:*:*:*:*:*:*:*", "matchCriteriaId": "2313AB9D-E18F-4603-8CE5-D0C3D9660785", "vulnerable": true }, { "criteria": "cpe:2.3:o:eq-3:homematic_ccu2_firmware:2.41.5:*:*:*:*:*:*:*", "matchCriteriaId": "CFE9F1F1-70FB-470C-8455-201797CA50D5", "vulnerable": true }, { "criteria": "cpe:2.3:o:eq-3:homematic_ccu2_firmware:2.41.8:*:*:*:*:*:*:*", "matchCriteriaId": "1CE5BE83-688F-4188-844F-328C846D90C2", "vulnerable": true }, { "criteria": "cpe:2.3:o:eq-3:homematic_ccu2_firmware:2.41.9:*:*:*:*:*:*:*", "matchCriteriaId": "592EDF0E-792F-4DEC-9926-E33675C5C7C9", "vulnerable": true }, { "criteria": "cpe:2.3:o:eq-3:homematic_ccu2_firmware:2.45.6:*:*:*:*:*:*:*", "matchCriteriaId": "38DF6345-9A75-4E5C-9BEC-CB6A0767E739", "vulnerable": true }, { "criteria": "cpe:2.3:o:eq-3:homematic_ccu2_firmware:2.45.7:*:*:*:*:*:*:*", "matchCriteriaId": "C1FA10A6-D09E-44EC-ABEB-49CFA8780456", "vulnerable": true }, { "criteria": "cpe:2.3:o:eq-3:homematic_ccu2_firmware:2.47.10:*:*:*:*:*:*:*", "matchCriteriaId": "E02A84D1-C6F6-4DE0-88A3-85F41A90D9EB", "vulnerable": true }, { "criteria": "cpe:2.3:o:eq-3:homematic_ccu2_firmware:2.47.12:*:*:*:*:*:*:*", "matchCriteriaId": "84030C3C-ED0D-4CB5-863C-F5663AE4AFE1", "vulnerable": true }, { "criteria": "cpe:2.3:o:eq-3:homematic_ccu2_firmware:2.47.15:*:*:*:*:*:*:*", "matchCriteriaId": "F03E1DE6-70FF-4EE9-A3E2-44020B64ADDB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:eq-3:homematic_ccu2:-:*:*:*:*:*:*:*", "matchCriteriaId": "9C2CF19C-7EDE-4E3C-A736-E6736FF03FDC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:eq-3:homematic_ccu3_firmware:3.41.11:*:*:*:*:*:*:*", "matchCriteriaId": "F63AD6F8-1BE7-481B-BDDE-45234840B530", "vulnerable": true }, { "criteria": "cpe:2.3:o:eq-3:homematic_ccu3_firmware:3.43.16:*:*:*:*:*:*:*", "matchCriteriaId": "ED2A0030-E46B-42EE-B545-1D04D46F3FB5", "vulnerable": true }, { "criteria": "cpe:2.3:o:eq-3:homematic_ccu3_firmware:3.45.5:*:*:*:*:*:*:*", "matchCriteriaId": "E2C1A46E-178C-4893-A172-6D081D9BAA67", "vulnerable": true }, { "criteria": "cpe:2.3:o:eq-3:homematic_ccu3_firmware:3.45.7:*:*:*:*:*:*:*", "matchCriteriaId": "75BE927B-CD17-4293-A440-8DD29C8CD23E", "vulnerable": true }, { "criteria": "cpe:2.3:o:eq-3:homematic_ccu3_firmware:3.47.10:*:*:*:*:*:*:*", "matchCriteriaId": "D4E76C1E-A745-4BEA-B3B2-2B613DA4FCC5", "vulnerable": true }, { "criteria": "cpe:2.3:o:eq-3:homematic_ccu3_firmware:3.47.15:*:*:*:*:*:*:*", "matchCriteriaId": "96CA7522-DB7E-4F61-BD85-A8F665AFC697", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:eq-3:homematic_ccu3:-:*:*:*:*:*:*:*", "matchCriteriaId": "33113AD0-F378-49B2-BCFC-C57B52FD3A04", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "eQ-3 Homematic CCU2 and CCU3 with the CUxD AddOn installed allow Remote Code Execution by unauthenticated attackers with access to the web interface, because this interface can access the CMD_EXEC virtual device type 28." }, { "lang": "es", "value": "eQ-3 Homematic CCU2 y CCU3 con el complemento CUxD instalado permiten la ejecuci\u00f3n remota de c\u00f3digo por parte de atacantes no autenticados con acceso a la interfaz web, porque esta interfaz puede acceder al dispositivo virtual CMD_EXEC tipo 28." } ], "id": "CVE-2019-14985", "lastModified": "2024-11-21T04:27:49.607", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-08-13T20:15:12.243", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://psytester.github.io/CVE-2019-14985/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://psytester.github.io/CVE-2019-14985/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-287" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-10-17 14:15
Modified
2024-11-21 04:29
Severity ?
Summary
eQ-3 HomeMatic CCU3 firmware 3.41.11 allows session fixation. An attacker can create session IDs and send them to the victim. After the victim logs in to the session, the attacker can use that session. The attacker could create SSH logins after a valid session and easily compromise the system.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://noskill1337.github.io/homematic-ccu3-session-fixation | Exploit, Mitigation, Third Party Advisory | |
cve@mitre.org | https://www.eq-3.com/products/homematic.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://noskill1337.github.io/homematic-ccu3-session-fixation | Exploit, Mitigation, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.eq-3.com/products/homematic.html | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
eq-3 | homematic_ccu3_firmware | 3.14.11 | |
eq-3 | homematic_ccu3 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:eq-3:homematic_ccu3_firmware:3.14.11:*:*:*:*:*:*:*", "matchCriteriaId": "74FC5540-61BD-463C-BAB5-BAC842036EAF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:eq-3:homematic_ccu3:-:*:*:*:*:*:*:*", "matchCriteriaId": "33113AD0-F378-49B2-BCFC-C57B52FD3A04", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "eQ-3 HomeMatic CCU3 firmware 3.41.11 allows session fixation. An attacker can create session IDs and send them to the victim. After the victim logs in to the session, the attacker can use that session. The attacker could create SSH logins after a valid session and easily compromise the system." }, { "lang": "es", "value": "eQ-3 HomeMatic CCU3 firmware versi\u00f3n 3.41.11, permite la fijaci\u00f3n de la sesi\u00f3n. Un atacante puede crear IDs de sesi\u00f3n y enviarlos a la v\u00edctima. Despu\u00e9s de que la v\u00edctima se registra en la sesi\u00f3n, el atacante puede usar esa sesi\u00f3n. El atacante podr\u00eda crear inicios de sesi\u00f3n SSH despu\u00e9s de una sesi\u00f3n v\u00e1lida y comprometer f\u00e1cilmente el sistema." } ], "id": "CVE-2019-15849", "lastModified": "2024-11-21T04:29:36.500", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4.9, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.1, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-10-17T14:15:10.760", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Mitigation", "Third Party Advisory" ], "url": "https://noskill1337.github.io/homematic-ccu3-session-fixation" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.eq-3.com/products/homematic.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Mitigation", "Third Party Advisory" ], "url": "https://noskill1337.github.io/homematic-ccu3-session-fixation" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.eq-3.com/products/homematic.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-384" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-11-14 19:15
Modified
2024-11-21 04:33
Severity ?
Summary
eQ-3 Homematic CCU2 2.47.20 and CCU3 3.47.18 with the E-Mail AddOn through 1.6.8.c installed allow Remote Code Execution by unauthenticated attackers with access to the web interface via the save.cgi script for payload upload and the testtcl.cgi script for its execution.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://psytester.github.io/CVE-2019-18938/ | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://psytester.github.io/CVE-2019-18938/ | Exploit, Third Party Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hm_email_project:hm_email:1.6.8c:*:*:*:*:*:*:*", "matchCriteriaId": "8E4A5F42-1C14-41B9-A8EA-09F65B4021A0", "vulnerable": true }, { "criteria": "cpe:2.3:h:eq-3:homematic_ccu2:-:*:*:*:*:*:*:*", "matchCriteriaId": "9C2CF19C-7EDE-4E3C-A736-E6736FF03FDC", "vulnerable": false }, { "criteria": "cpe:2.3:o:eq-3:homematic_ccu2_firmware:2.24.20:*:*:*:*:*:*:*", "matchCriteriaId": "21BF0340-7566-4DE6-8AEE-FBB8C63465F8", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hm_email_project:hm_email:1.6.8c:*:*:*:*:*:*:*", "matchCriteriaId": "8E4A5F42-1C14-41B9-A8EA-09F65B4021A0", "vulnerable": true }, { "criteria": "cpe:2.3:h:eq-3:homematic_ccu3:-:*:*:*:*:*:*:*", "matchCriteriaId": "33113AD0-F378-49B2-BCFC-C57B52FD3A04", "vulnerable": false }, { "criteria": "cpe:2.3:o:eq-3:homematic_ccu3_firmware:3.47.18:*:*:*:*:*:*:*", "matchCriteriaId": "285F4E29-E299-4F83-9F7E-BB19933AD654", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hm_email_project:hm_email:1.6.8b:*:*:*:*:*:*:*", "matchCriteriaId": "B031EAFD-2BED-4A83-92F4-A4914EBD3013", "vulnerable": true }, { "criteria": "cpe:2.3:h:eq-3:homematic_ccu2:-:*:*:*:*:*:*:*", "matchCriteriaId": "9C2CF19C-7EDE-4E3C-A736-E6736FF03FDC", "vulnerable": false }, { "criteria": "cpe:2.3:o:eq-3:homematic_ccu2_firmware:2.24.20:*:*:*:*:*:*:*", "matchCriteriaId": "21BF0340-7566-4DE6-8AEE-FBB8C63465F8", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hm_email_project:hm_email:1.6.8a:*:*:*:*:*:*:*", "matchCriteriaId": "2509512A-0851-4DED-AF9A-797952DEC2D3", "vulnerable": true }, { "criteria": "cpe:2.3:h:eq-3:homematic_ccu2:-:*:*:*:*:*:*:*", "matchCriteriaId": "9C2CF19C-7EDE-4E3C-A736-E6736FF03FDC", "vulnerable": false }, { "criteria": "cpe:2.3:o:eq-3:homematic_ccu2_firmware:2.24.20:*:*:*:*:*:*:*", "matchCriteriaId": "21BF0340-7566-4DE6-8AEE-FBB8C63465F8", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hm_email_project:hm_email:1.6.7c:*:*:*:*:*:*:*", "matchCriteriaId": "EB6EB4B6-C529-43BA-9440-1DA07F443C8B", "vulnerable": true }, { "criteria": "cpe:2.3:h:eq-3:homematic_ccu2:-:*:*:*:*:*:*:*", "matchCriteriaId": "9C2CF19C-7EDE-4E3C-A736-E6736FF03FDC", "vulnerable": false }, { "criteria": "cpe:2.3:o:eq-3:homematic_ccu2_firmware:2.24.20:*:*:*:*:*:*:*", "matchCriteriaId": "21BF0340-7566-4DE6-8AEE-FBB8C63465F8", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hm_email_project:hm_email:1.6.7b:*:*:*:*:*:*:*", "matchCriteriaId": "E2534D3D-47AE-4446-A57E-126EC1A59631", "vulnerable": true }, { "criteria": "cpe:2.3:h:eq-3:homematic_ccu2:-:*:*:*:*:*:*:*", "matchCriteriaId": "9C2CF19C-7EDE-4E3C-A736-E6736FF03FDC", "vulnerable": false }, { "criteria": "cpe:2.3:o:eq-3:homematic_ccu2_firmware:2.24.20:*:*:*:*:*:*:*", "matchCriteriaId": "21BF0340-7566-4DE6-8AEE-FBB8C63465F8", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hm_email_project:hm_email:1.6.7a:*:*:*:*:*:*:*", "matchCriteriaId": "E1C08DB9-674E-4E2B-B744-D48A9746E1C7", "vulnerable": true }, { "criteria": "cpe:2.3:h:eq-3:homematic_ccu2:-:*:*:*:*:*:*:*", "matchCriteriaId": "9C2CF19C-7EDE-4E3C-A736-E6736FF03FDC", "vulnerable": false }, { "criteria": "cpe:2.3:o:eq-3:homematic_ccu2_firmware:2.24.20:*:*:*:*:*:*:*", "matchCriteriaId": "21BF0340-7566-4DE6-8AEE-FBB8C63465F8", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hm_email_project:hm_email:1.6.7:*:*:*:*:*:*:*", "matchCriteriaId": "A2A4373A-BE30-4303-8ADA-CADB826EE4C3", "vulnerable": true }, { "criteria": "cpe:2.3:h:eq-3:homematic_ccu2:-:*:*:*:*:*:*:*", "matchCriteriaId": "9C2CF19C-7EDE-4E3C-A736-E6736FF03FDC", "vulnerable": false }, { "criteria": "cpe:2.3:o:eq-3:homematic_ccu2_firmware:2.24.20:*:*:*:*:*:*:*", "matchCriteriaId": "21BF0340-7566-4DE6-8AEE-FBB8C63465F8", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hm_email_project:hm_email:1.6.6:*:*:*:*:*:*:*", "matchCriteriaId": "C26EFB36-2187-491E-B47E-A940A026451B", "vulnerable": true }, { "criteria": "cpe:2.3:h:eq-3:homematic_ccu2:-:*:*:*:*:*:*:*", "matchCriteriaId": "9C2CF19C-7EDE-4E3C-A736-E6736FF03FDC", "vulnerable": false }, { "criteria": "cpe:2.3:o:eq-3:homematic_ccu2_firmware:2.24.20:*:*:*:*:*:*:*", "matchCriteriaId": "21BF0340-7566-4DE6-8AEE-FBB8C63465F8", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hm_email_project:hm_email:1.6.5:*:*:*:*:*:*:*", "matchCriteriaId": "0C6850D0-4416-49E8-AB9E-BBA746940E8A", "vulnerable": true }, { "criteria": "cpe:2.3:h:eq-3:homematic_ccu2:-:*:*:*:*:*:*:*", "matchCriteriaId": "9C2CF19C-7EDE-4E3C-A736-E6736FF03FDC", "vulnerable": false }, { "criteria": "cpe:2.3:o:eq-3:homematic_ccu2_firmware:2.24.20:*:*:*:*:*:*:*", "matchCriteriaId": "21BF0340-7566-4DE6-8AEE-FBB8C63465F8", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hm_email_project:hm_email:1.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "8CCC8AB6-0EA3-411C-9918-3351B50CF316", "vulnerable": true }, { "criteria": "cpe:2.3:h:eq-3:homematic_ccu2:-:*:*:*:*:*:*:*", "matchCriteriaId": "9C2CF19C-7EDE-4E3C-A736-E6736FF03FDC", "vulnerable": false }, { "criteria": "cpe:2.3:o:eq-3:homematic_ccu2_firmware:2.24.20:*:*:*:*:*:*:*", "matchCriteriaId": "21BF0340-7566-4DE6-8AEE-FBB8C63465F8", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hm_email_project:hm_email:1.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "302A36BE-0D97-471E-A0B1-60A6CD70A02E", "vulnerable": true }, { "criteria": "cpe:2.3:h:eq-3:homematic_ccu2:-:*:*:*:*:*:*:*", "matchCriteriaId": "9C2CF19C-7EDE-4E3C-A736-E6736FF03FDC", "vulnerable": false }, { "criteria": "cpe:2.3:o:eq-3:homematic_ccu2_firmware:2.24.20:*:*:*:*:*:*:*", "matchCriteriaId": "21BF0340-7566-4DE6-8AEE-FBB8C63465F8", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hm_email_project:hm_email:1.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "B3C98214-5075-4663-B4DE-B227F0D2F349", "vulnerable": true }, { "criteria": "cpe:2.3:h:eq-3:homematic_ccu2:-:*:*:*:*:*:*:*", "matchCriteriaId": "9C2CF19C-7EDE-4E3C-A736-E6736FF03FDC", "vulnerable": false }, { "criteria": "cpe:2.3:o:eq-3:homematic_ccu2_firmware:2.24.20:*:*:*:*:*:*:*", "matchCriteriaId": "21BF0340-7566-4DE6-8AEE-FBB8C63465F8", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hm_email_project:hm_email:1.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "506C69A0-1162-43FA-AAC1-A6EFA619DFCC", "vulnerable": true }, { "criteria": "cpe:2.3:h:eq-3:homematic_ccu2:-:*:*:*:*:*:*:*", "matchCriteriaId": "9C2CF19C-7EDE-4E3C-A736-E6736FF03FDC", "vulnerable": false }, { "criteria": "cpe:2.3:o:eq-3:homematic_ccu2_firmware:2.24.20:*:*:*:*:*:*:*", "matchCriteriaId": "21BF0340-7566-4DE6-8AEE-FBB8C63465F8", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hm_email_project:hm_email:1.6.8:*:*:*:*:*:*:*", "matchCriteriaId": "1A27F99A-063B-4285-8B69-89809A5324A7", "vulnerable": true }, { "criteria": "cpe:2.3:h:eq-3:homematic_ccu2:-:*:*:*:*:*:*:*", "matchCriteriaId": "9C2CF19C-7EDE-4E3C-A736-E6736FF03FDC", "vulnerable": false }, { "criteria": "cpe:2.3:o:eq-3:homematic_ccu2_firmware:2.24.20:*:*:*:*:*:*:*", "matchCriteriaId": "21BF0340-7566-4DE6-8AEE-FBB8C63465F8", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hm_email_project:hm_email:1.6.8b:*:*:*:*:*:*:*", "matchCriteriaId": "B031EAFD-2BED-4A83-92F4-A4914EBD3013", "vulnerable": true }, { "criteria": "cpe:2.3:h:eq-3:homematic_ccu3:-:*:*:*:*:*:*:*", "matchCriteriaId": "33113AD0-F378-49B2-BCFC-C57B52FD3A04", "vulnerable": false }, { "criteria": "cpe:2.3:o:eq-3:homematic_ccu3_firmware:3.47.18:*:*:*:*:*:*:*", "matchCriteriaId": "285F4E29-E299-4F83-9F7E-BB19933AD654", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hm_email_project:hm_email:1.6.8a:*:*:*:*:*:*:*", "matchCriteriaId": "2509512A-0851-4DED-AF9A-797952DEC2D3", "vulnerable": true }, { "criteria": "cpe:2.3:h:eq-3:homematic_ccu3:-:*:*:*:*:*:*:*", "matchCriteriaId": "33113AD0-F378-49B2-BCFC-C57B52FD3A04", "vulnerable": false }, { "criteria": "cpe:2.3:o:eq-3:homematic_ccu3_firmware:3.47.18:*:*:*:*:*:*:*", "matchCriteriaId": "285F4E29-E299-4F83-9F7E-BB19933AD654", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hm_email_project:hm_email:1.6.8:*:*:*:*:*:*:*", "matchCriteriaId": "1A27F99A-063B-4285-8B69-89809A5324A7", "vulnerable": true }, { "criteria": "cpe:2.3:h:eq-3:homematic_ccu3:-:*:*:*:*:*:*:*", "matchCriteriaId": "33113AD0-F378-49B2-BCFC-C57B52FD3A04", "vulnerable": false }, { "criteria": "cpe:2.3:o:eq-3:homematic_ccu3_firmware:3.47.18:*:*:*:*:*:*:*", "matchCriteriaId": "285F4E29-E299-4F83-9F7E-BB19933AD654", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hm_email_project:hm_email:1.6.7c:*:*:*:*:*:*:*", "matchCriteriaId": "EB6EB4B6-C529-43BA-9440-1DA07F443C8B", "vulnerable": true }, { "criteria": "cpe:2.3:h:eq-3:homematic_ccu3:-:*:*:*:*:*:*:*", "matchCriteriaId": "33113AD0-F378-49B2-BCFC-C57B52FD3A04", "vulnerable": false }, { "criteria": "cpe:2.3:o:eq-3:homematic_ccu3_firmware:3.47.18:*:*:*:*:*:*:*", "matchCriteriaId": "285F4E29-E299-4F83-9F7E-BB19933AD654", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hm_email_project:hm_email:1.6.7b:*:*:*:*:*:*:*", "matchCriteriaId": "E2534D3D-47AE-4446-A57E-126EC1A59631", "vulnerable": true }, { "criteria": "cpe:2.3:h:eq-3:homematic_ccu3:-:*:*:*:*:*:*:*", "matchCriteriaId": "33113AD0-F378-49B2-BCFC-C57B52FD3A04", "vulnerable": false }, { "criteria": "cpe:2.3:o:eq-3:homematic_ccu3_firmware:3.47.18:*:*:*:*:*:*:*", "matchCriteriaId": "285F4E29-E299-4F83-9F7E-BB19933AD654", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hm_email_project:hm_email:1.6.7a:*:*:*:*:*:*:*", "matchCriteriaId": "E1C08DB9-674E-4E2B-B744-D48A9746E1C7", "vulnerable": true }, { "criteria": "cpe:2.3:h:eq-3:homematic_ccu3:-:*:*:*:*:*:*:*", "matchCriteriaId": "33113AD0-F378-49B2-BCFC-C57B52FD3A04", "vulnerable": false }, { "criteria": "cpe:2.3:o:eq-3:homematic_ccu3_firmware:3.47.18:*:*:*:*:*:*:*", "matchCriteriaId": "285F4E29-E299-4F83-9F7E-BB19933AD654", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hm_email_project:hm_email:1.6.7:*:*:*:*:*:*:*", "matchCriteriaId": "A2A4373A-BE30-4303-8ADA-CADB826EE4C3", "vulnerable": true }, { "criteria": "cpe:2.3:h:eq-3:homematic_ccu3:-:*:*:*:*:*:*:*", "matchCriteriaId": "33113AD0-F378-49B2-BCFC-C57B52FD3A04", "vulnerable": false }, { "criteria": "cpe:2.3:o:eq-3:homematic_ccu3_firmware:3.47.18:*:*:*:*:*:*:*", "matchCriteriaId": "285F4E29-E299-4F83-9F7E-BB19933AD654", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hm_email_project:hm_email:1.6.6:*:*:*:*:*:*:*", "matchCriteriaId": "C26EFB36-2187-491E-B47E-A940A026451B", "vulnerable": true }, { "criteria": "cpe:2.3:h:eq-3:homematic_ccu3:-:*:*:*:*:*:*:*", "matchCriteriaId": "33113AD0-F378-49B2-BCFC-C57B52FD3A04", "vulnerable": false }, { "criteria": "cpe:2.3:o:eq-3:homematic_ccu3_firmware:3.47.18:*:*:*:*:*:*:*", "matchCriteriaId": "285F4E29-E299-4F83-9F7E-BB19933AD654", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hm_email_project:hm_email:1.6.5:*:*:*:*:*:*:*", "matchCriteriaId": "0C6850D0-4416-49E8-AB9E-BBA746940E8A", "vulnerable": true }, { "criteria": "cpe:2.3:h:eq-3:homematic_ccu3:-:*:*:*:*:*:*:*", "matchCriteriaId": "33113AD0-F378-49B2-BCFC-C57B52FD3A04", "vulnerable": false }, { "criteria": "cpe:2.3:o:eq-3:homematic_ccu3_firmware:3.47.18:*:*:*:*:*:*:*", "matchCriteriaId": "285F4E29-E299-4F83-9F7E-BB19933AD654", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hm_email_project:hm_email:1.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "8CCC8AB6-0EA3-411C-9918-3351B50CF316", "vulnerable": true }, { "criteria": "cpe:2.3:h:eq-3:homematic_ccu3:-:*:*:*:*:*:*:*", "matchCriteriaId": "33113AD0-F378-49B2-BCFC-C57B52FD3A04", "vulnerable": false }, { "criteria": "cpe:2.3:o:eq-3:homematic_ccu3_firmware:3.47.18:*:*:*:*:*:*:*", "matchCriteriaId": "285F4E29-E299-4F83-9F7E-BB19933AD654", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hm_email_project:hm_email:1.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "302A36BE-0D97-471E-A0B1-60A6CD70A02E", "vulnerable": true }, { "criteria": "cpe:2.3:h:eq-3:homematic_ccu3:-:*:*:*:*:*:*:*", "matchCriteriaId": "33113AD0-F378-49B2-BCFC-C57B52FD3A04", "vulnerable": false }, { "criteria": "cpe:2.3:o:eq-3:homematic_ccu3_firmware:3.47.18:*:*:*:*:*:*:*", "matchCriteriaId": "285F4E29-E299-4F83-9F7E-BB19933AD654", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hm_email_project:hm_email:1.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "B3C98214-5075-4663-B4DE-B227F0D2F349", "vulnerable": true }, { "criteria": "cpe:2.3:h:eq-3:homematic_ccu3:-:*:*:*:*:*:*:*", "matchCriteriaId": "33113AD0-F378-49B2-BCFC-C57B52FD3A04", "vulnerable": false }, { "criteria": "cpe:2.3:o:eq-3:homematic_ccu3_firmware:3.47.18:*:*:*:*:*:*:*", "matchCriteriaId": "285F4E29-E299-4F83-9F7E-BB19933AD654", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hm_email_project:hm_email:1.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "506C69A0-1162-43FA-AAC1-A6EFA619DFCC", "vulnerable": true }, { "criteria": "cpe:2.3:h:eq-3:homematic_ccu3:-:*:*:*:*:*:*:*", "matchCriteriaId": "33113AD0-F378-49B2-BCFC-C57B52FD3A04", "vulnerable": false }, { "criteria": "cpe:2.3:o:eq-3:homematic_ccu3_firmware:3.47.18:*:*:*:*:*:*:*", "matchCriteriaId": "285F4E29-E299-4F83-9F7E-BB19933AD654", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "eQ-3 Homematic CCU2 2.47.20 and CCU3 3.47.18 with the E-Mail AddOn through 1.6.8.c installed allow Remote Code Execution by unauthenticated attackers with access to the web interface via the save.cgi script for payload upload and the testtcl.cgi script for its execution." }, { "lang": "es", "value": "eQ-3 Homematic CCU2 versi\u00f3n 2.47.20 y CCU3 versi\u00f3n 3.47.18 con el AddOn E-Mail instalado versiones hasta 1.6.8.c, permite la Ejecuci\u00f3n de C\u00f3digo Remota por parte de atacantes no autenticados con acceso a la interfaz web por medio de l script save.cgi para cargar una carga \u00fatil y el script testtcl.cgi para su ejecuci\u00f3n." } ], "id": "CVE-2019-18938", "lastModified": "2024-11-21T04:33:52.720", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-11-14T19:15:13.347", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://psytester.github.io/CVE-2019-18938/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://psytester.github.io/CVE-2019-18938/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-306" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-07-22 18:15
Modified
2024-11-21 06:08
Severity ?
Summary
A Remote Code Execution (RCE) vulnerability in the WebUI component of the eQ-3 HomeMatic CCU2 firmware up to and including version 2.57.5 and CCU3 firmware up to and including version 3.57.5 allows remote unauthenticated attackers to execute system commands as root via a simple HTTP request.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://novag.github.io/posts/homematic-unauthenticated-remote-code-execution/ | Exploit, Third Party Advisory | |
cve@mitre.org | https://www.eq-3.de/downloads/software/HM-CCU2-Firmware_Updates/HM-CCU-2.59.7/HM-CCU2-Changelog.2.59.7.pdf | Release Notes, Vendor Advisory | |
cve@mitre.org | https://www.eq-3.de/downloads/software/firmware/ccu3-firmware/CCU3-Changelog.3.59.6.pdf | Release Notes, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://novag.github.io/posts/homematic-unauthenticated-remote-code-execution/ | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.eq-3.de/downloads/software/HM-CCU2-Firmware_Updates/HM-CCU-2.59.7/HM-CCU2-Changelog.2.59.7.pdf | Release Notes, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.eq-3.de/downloads/software/firmware/ccu3-firmware/CCU3-Changelog.3.59.6.pdf | Release Notes, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
eq-3 | homematic_ccu2_firmware | * | |
eq-3 | homematic_ccu2 | - | |
eq-3 | homematic_ccu3_firmware | * | |
eq-3 | homematic_ccu3 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:eq-3:homematic_ccu2_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3D8EB8BC-1D19-4177-BA57-1E8DABD9C03C", "versionEndIncluding": "2.57.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:eq-3:homematic_ccu2:-:*:*:*:*:*:*:*", "matchCriteriaId": "9C2CF19C-7EDE-4E3C-A736-E6736FF03FDC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:eq-3:homematic_ccu3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F14B9250-FCD9-404C-A1BE-A9F3893B2189", "versionEndIncluding": "3.57.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:eq-3:homematic_ccu3:-:*:*:*:*:*:*:*", "matchCriteriaId": "33113AD0-F378-49B2-BCFC-C57B52FD3A04", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A Remote Code Execution (RCE) vulnerability in the WebUI component of the eQ-3 HomeMatic CCU2 firmware up to and including version 2.57.5 and CCU3 firmware up to and including version 3.57.5 allows remote unauthenticated attackers to execute system commands as root via a simple HTTP request." }, { "lang": "es", "value": "Una vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo (RCE) en el componente WebUI del firmware eQ-3 HomeMatic CCU2 hasta la versi\u00f3n 2.57.5 inclusive y del firmware CCU3 hasta la versi\u00f3n 3.57.5 inclusive permite a los atacantes remotos no autentificados ejecutar comandos del sistema como root a trav\u00e9s de una simple petici\u00f3n HTTP." } ], "id": "CVE-2021-33032", "lastModified": "2024-11-21T06:08:09.627", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 10.0, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 6.0, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-07-22T18:15:23.177", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://novag.github.io/posts/homematic-unauthenticated-remote-code-execution/" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://www.eq-3.de/downloads/software/HM-CCU2-Firmware_Updates/HM-CCU-2.59.7/HM-CCU2-Changelog.2.59.7.pdf" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://www.eq-3.de/downloads/software/firmware/ccu3-firmware/CCU3-Changelog.3.59.6.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://novag.github.io/posts/homematic-unauthenticated-remote-code-execution/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://www.eq-3.de/downloads/software/HM-CCU2-Firmware_Updates/HM-CCU-2.59.7/HM-CCU2-Changelog.2.59.7.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://www.eq-3.de/downloads/software/firmware/ccu3-firmware/CCU3-Changelog.3.59.6.pdf" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-78" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-10-17 14:15
Modified
2024-11-21 04:29
Severity ?
Summary
eQ-3 HomeMatic CCU3 firmware version 3.41.11 allows Remote Code Execution in the ReGa.runScript method. An authenticated attacker can easily execute code and compromise the system.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://noskill1337.github.io/homematic-ccu3-remote-code-execution | Exploit, Third Party Advisory | |
cve@mitre.org | https://www.eq-3.com/products/homematic.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://noskill1337.github.io/homematic-ccu3-remote-code-execution | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.eq-3.com/products/homematic.html | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
eq-3 | homematic_ccu3_firmware | 3.41.11 | |
eq-3 | homematic_ccu3 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:eq-3:homematic_ccu3_firmware:3.41.11:*:*:*:*:*:*:*", "matchCriteriaId": "F63AD6F8-1BE7-481B-BDDE-45234840B530", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:eq-3:homematic_ccu3:-:*:*:*:*:*:*:*", "matchCriteriaId": "33113AD0-F378-49B2-BCFC-C57B52FD3A04", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "eQ-3 HomeMatic CCU3 firmware version 3.41.11 allows Remote Code Execution in the ReGa.runScript method. An authenticated attacker can easily execute code and compromise the system." }, { "lang": "es", "value": "eQ-3 HomeMatic CCU3 firmware versi\u00f3n 3.41.11, permite la Ejecuci\u00f3n de C\u00f3digo Remota en el m\u00e9todo ReGa.runScript. Un atacante autenticado puede ejecutar c\u00f3digo f\u00e1cilmente y comprometer el sistema." } ], "id": "CVE-2019-15850", "lastModified": "2024-11-21T04:29:36.637", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-10-17T14:15:10.823", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://noskill1337.github.io/homematic-ccu3-remote-code-execution" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.eq-3.com/products/homematic.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://noskill1337.github.io/homematic-ccu3-remote-code-execution" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.eq-3.com/products/homematic.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-862" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-08-13 20:15
Modified
2024-11-21 04:27
Severity ?
Summary
eQ-3 Homematic CCU2 and CCU3 with the XML-API through 1.2.0 AddOn installed allow Remote Code Execution by unauthenticated attackers with access to the web interface, because the undocumented addons/xmlapi/exec.cgi script uses CMD_EXEC to execute TCL code from a POST request.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://psytester.github.io/CVE-2019-14984/ | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://psytester.github.io/CVE-2019-14984/ | Exploit, Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
eq-3 | homematic_ccu2_firmware | * | |
eq-3 | homematic_ccu2 | - | |
eq-3 | homematic_ccu3_firmware | * | |
eq-3 | homematic_ccu3 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:eq-3:homematic_ccu2_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E3C47241-3B90-4A89-A4DE-ADE6665AFA77", "versionEndIncluding": "1.2.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:eq-3:homematic_ccu2:-:*:*:*:*:*:*:*", "matchCriteriaId": "9C2CF19C-7EDE-4E3C-A736-E6736FF03FDC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:eq-3:homematic_ccu3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "25543AD9-88B2-4AD2-8A2C-C13F38749D30", "versionEndIncluding": "1.2.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:eq-3:homematic_ccu3:-:*:*:*:*:*:*:*", "matchCriteriaId": "33113AD0-F378-49B2-BCFC-C57B52FD3A04", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "eQ-3 Homematic CCU2 and CCU3 with the XML-API through 1.2.0 AddOn installed allow Remote Code Execution by unauthenticated attackers with access to the web interface, because the undocumented addons/xmlapi/exec.cgi script uses CMD_EXEC to execute TCL code from a POST request." }, { "lang": "es", "value": "eQ-3 Homematic CCU2 y CCU3 con la API XML a trav\u00e9s de 1.2.0 AddOn instalado permiten la ejecuci\u00f3n remota de c\u00f3digo por parte de atacantes no autenticados con acceso a la interfaz web, porque el script addons / xmlapi / exec.cgi no documentado utiliza CMD_EXEC para ejecutar el c\u00f3digo TCL desde una solicitud POST" } ], "id": "CVE-2019-14984", "lastModified": "2024-11-21T04:27:49.467", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-08-13T20:15:12.150", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://psytester.github.io/CVE-2019-14984/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://psytester.github.io/CVE-2019-14984/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-306" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
cve-2019-15849
Vulnerability from cvelistv5
Published
2019-10-17 13:33
Modified
2024-08-05 01:03
Severity ?
EPSS score ?
Summary
eQ-3 HomeMatic CCU3 firmware 3.41.11 allows session fixation. An attacker can create session IDs and send them to the victim. After the victim logs in to the session, the attacker can use that session. The attacker could create SSH logins after a valid session and easily compromise the system.
References
▼ | URL | Tags |
---|---|---|
https://www.eq-3.com/products/homematic.html | x_refsource_MISC | |
https://noskill1337.github.io/homematic-ccu3-session-fixation | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T01:03:30.904Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.eq-3.com/products/homematic.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://noskill1337.github.io/homematic-ccu3-session-fixation" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "eQ-3 HomeMatic CCU3 firmware 3.41.11 allows session fixation. An attacker can create session IDs and send them to the victim. After the victim logs in to the session, the attacker can use that session. The attacker could create SSH logins after a valid session and easily compromise the system." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-10-17T13:33:20", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.eq-3.com/products/homematic.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://noskill1337.github.io/homematic-ccu3-session-fixation" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-15849", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "eQ-3 HomeMatic CCU3 firmware 3.41.11 allows session fixation. An attacker can create session IDs and send them to the victim. After the victim logs in to the session, the attacker can use that session. The attacker could create SSH logins after a valid session and easily compromise the system." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.eq-3.com/products/homematic.html", "refsource": "MISC", "url": "https://www.eq-3.com/products/homematic.html" }, { "name": "https://noskill1337.github.io/homematic-ccu3-session-fixation", "refsource": "MISC", "url": "https://noskill1337.github.io/homematic-ccu3-session-fixation" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-15849", "datePublished": "2019-10-17T13:33:20", "dateReserved": "2019-09-02T00:00:00", "dateUpdated": "2024-08-05T01:03:30.904Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-12834
Vulnerability from cvelistv5
Published
2020-05-15 16:14
Modified
2024-08-04 12:04
Severity ?
EPSS score ?
Summary
eQ-3 Homematic Central Control Unit (CCU)2 through 2.51.6 and CCU3 through 3.51.6 allow Remote Code Execution in the JSON API Method ReGa.runScript, by unauthenticated attackers with access to the web interface, due to the default auto-login feature being enabled during first-time setup (or factory reset).
References
▼ | URL | Tags |
---|---|---|
https://psytester.github.io/CVE-2020-12834/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T12:04:22.903Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://psytester.github.io/CVE-2020-12834/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "eQ-3 Homematic Central Control Unit (CCU)2 through 2.51.6 and CCU3 through 3.51.6 allow Remote Code Execution in the JSON API Method ReGa.runScript, by unauthenticated attackers with access to the web interface, due to the default auto-login feature being enabled during first-time setup (or factory reset)." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-05-15T16:14:49", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://psytester.github.io/CVE-2020-12834/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-12834", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "eQ-3 Homematic Central Control Unit (CCU)2 through 2.51.6 and CCU3 through 3.51.6 allow Remote Code Execution in the JSON API Method ReGa.runScript, by unauthenticated attackers with access to the web interface, due to the default auto-login feature being enabled during first-time setup (or factory reset)." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://psytester.github.io/CVE-2020-12834/", "refsource": "MISC", "url": "https://psytester.github.io/CVE-2020-12834/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-12834", "datePublished": "2020-05-15T16:14:49", "dateReserved": "2020-05-13T00:00:00", "dateUpdated": "2024-08-04T12:04:22.903Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-9585
Vulnerability from cvelistv5
Published
2019-08-14 20:10
Modified
2024-08-04 21:54
Severity ?
EPSS score ?
Summary
eQ-3 Homematic CCU2 prior to 2.47.10 and CCU3 prior to 3.47.10 JSON API has Improper Access Control for Interface.***Metadata related operations, resulting in the ability to read, set and deletion of Metadata.
References
▼ | URL | Tags |
---|---|---|
https://github.com/psytester/psytester.github.io/blob/master/_posts/hacking_and_pentests/CVEs/2019-03-27-CVE-2019-9585.md | x_refsource_MISC | |
https://psytester.github.io/CVE-2019-9585/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T21:54:44.538Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/psytester/psytester.github.io/blob/master/_posts/hacking_and_pentests/CVEs/2019-03-27-CVE-2019-9585.md" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://psytester.github.io/CVE-2019-9585/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "eQ-3 Homematic CCU2 prior to 2.47.10 and CCU3 prior to 3.47.10 JSON API has Improper Access Control for Interface.***Metadata related operations, resulting in the ability to read, set and deletion of Metadata." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-08-14T20:10:17", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/psytester/psytester.github.io/blob/master/_posts/hacking_and_pentests/CVEs/2019-03-27-CVE-2019-9585.md" }, { "tags": [ "x_refsource_MISC" ], "url": "https://psytester.github.io/CVE-2019-9585/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-9585", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "eQ-3 Homematic CCU2 prior to 2.47.10 and CCU3 prior to 3.47.10 JSON API has Improper Access Control for Interface.***Metadata related operations, resulting in the ability to read, set and deletion of Metadata." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/psytester/psytester.github.io/blob/master/_posts/hacking_and_pentests/CVEs/2019-03-27-CVE-2019-9585.md", "refsource": "MISC", "url": "https://github.com/psytester/psytester.github.io/blob/master/_posts/hacking_and_pentests/CVEs/2019-03-27-CVE-2019-9585.md" }, { "name": "https://psytester.github.io/CVE-2019-9585/", "refsource": "MISC", "url": "https://psytester.github.io/CVE-2019-9585/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-9585", "datePublished": "2019-08-14T20:10:17", "dateReserved": "2019-03-06T00:00:00", "dateUpdated": "2024-08-04T21:54:44.538Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-18937
Vulnerability from cvelistv5
Published
2019-11-14 18:50
Modified
2024-08-05 02:02
Severity ?
EPSS score ?
Summary
eQ-3 Homematic CCU2 2.47.20 and CCU3 3.47.18 with the Script Parser AddOn through 1.8 installed allow Remote Code Execution by unauthenticated attackers with access to the web interface via the exec.cgi script, which executes TCL script content from an HTTP POST request.
References
▼ | URL | Tags |
---|---|---|
https://psytester.github.io/CVE-2019-18937/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T02:02:39.918Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://psytester.github.io/CVE-2019-18937/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "eQ-3 Homematic CCU2 2.47.20 and CCU3 3.47.18 with the Script Parser AddOn through 1.8 installed allow Remote Code Execution by unauthenticated attackers with access to the web interface via the exec.cgi script, which executes TCL script content from an HTTP POST request." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-11-14T18:50:42", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://psytester.github.io/CVE-2019-18937/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-18937", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "eQ-3 Homematic CCU2 2.47.20 and CCU3 3.47.18 with the Script Parser AddOn through 1.8 installed allow Remote Code Execution by unauthenticated attackers with access to the web interface via the exec.cgi script, which executes TCL script content from an HTTP POST request." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://psytester.github.io/CVE-2019-18937/", "refsource": "MISC", "url": "https://psytester.github.io/CVE-2019-18937/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-18937", "datePublished": "2019-11-14T18:50:42", "dateReserved": "2019-11-13T00:00:00", "dateUpdated": "2024-08-05T02:02:39.918Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-14986
Vulnerability from cvelistv5
Published
2019-08-13 19:19
Modified
2024-08-05 00:34
Severity ?
EPSS score ?
Summary
eQ-3 Homematic CCU2 and CCU3 with the CUxD AddOn before 2.3.0 installed allow administrative operations by unauthenticated attackers with access to the web interface, because features such as File-Browser and Shell Command (as well as "Set root password") are exposed.
References
▼ | URL | Tags |
---|---|---|
https://psytester.github.io/CVE-2019-14986/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T00:34:53.132Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://psytester.github.io/CVE-2019-14986/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "eQ-3 Homematic CCU2 and CCU3 with the CUxD AddOn before 2.3.0 installed allow administrative operations by unauthenticated attackers with access to the web interface, because features such as File-Browser and Shell Command (as well as \"Set root password\") are exposed." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-08-13T19:19:44", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://psytester.github.io/CVE-2019-14986/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-14986", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "eQ-3 Homematic CCU2 and CCU3 with the CUxD AddOn before 2.3.0 installed allow administrative operations by unauthenticated attackers with access to the web interface, because features such as File-Browser and Shell Command (as well as \"Set root password\") are exposed." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://psytester.github.io/CVE-2019-14986/", "refsource": "MISC", "url": "https://psytester.github.io/CVE-2019-14986/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-14986", "datePublished": "2019-08-13T19:19:44", "dateReserved": "2019-08-12T00:00:00", "dateUpdated": "2024-08-05T00:34:53.132Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-18938
Vulnerability from cvelistv5
Published
2019-11-14 18:52
Modified
2024-08-05 02:02
Severity ?
EPSS score ?
Summary
eQ-3 Homematic CCU2 2.47.20 and CCU3 3.47.18 with the E-Mail AddOn through 1.6.8.c installed allow Remote Code Execution by unauthenticated attackers with access to the web interface via the save.cgi script for payload upload and the testtcl.cgi script for its execution.
References
▼ | URL | Tags |
---|---|---|
https://psytester.github.io/CVE-2019-18938/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T02:02:39.909Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://psytester.github.io/CVE-2019-18938/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "eQ-3 Homematic CCU2 2.47.20 and CCU3 3.47.18 with the E-Mail AddOn through 1.6.8.c installed allow Remote Code Execution by unauthenticated attackers with access to the web interface via the save.cgi script for payload upload and the testtcl.cgi script for its execution." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-11-14T18:52:33", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://psytester.github.io/CVE-2019-18938/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-18938", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "eQ-3 Homematic CCU2 2.47.20 and CCU3 3.47.18 with the E-Mail AddOn through 1.6.8.c installed allow Remote Code Execution by unauthenticated attackers with access to the web interface via the save.cgi script for payload upload and the testtcl.cgi script for its execution." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://psytester.github.io/CVE-2019-18938/", "refsource": "MISC", "url": "https://psytester.github.io/CVE-2019-18938/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-18938", "datePublished": "2019-11-14T18:52:33", "dateReserved": "2019-11-13T00:00:00", "dateUpdated": "2024-08-05T02:02:39.909Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-14984
Vulnerability from cvelistv5
Published
2019-08-13 19:15
Modified
2024-08-05 00:34
Severity ?
EPSS score ?
Summary
eQ-3 Homematic CCU2 and CCU3 with the XML-API through 1.2.0 AddOn installed allow Remote Code Execution by unauthenticated attackers with access to the web interface, because the undocumented addons/xmlapi/exec.cgi script uses CMD_EXEC to execute TCL code from a POST request.
References
▼ | URL | Tags |
---|---|---|
https://psytester.github.io/CVE-2019-14984/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T00:34:52.992Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://psytester.github.io/CVE-2019-14984/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "eQ-3 Homematic CCU2 and CCU3 with the XML-API through 1.2.0 AddOn installed allow Remote Code Execution by unauthenticated attackers with access to the web interface, because the undocumented addons/xmlapi/exec.cgi script uses CMD_EXEC to execute TCL code from a POST request." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-08-13T19:15:17", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://psytester.github.io/CVE-2019-14984/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-14984", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "eQ-3 Homematic CCU2 and CCU3 with the XML-API through 1.2.0 AddOn installed allow Remote Code Execution by unauthenticated attackers with access to the web interface, because the undocumented addons/xmlapi/exec.cgi script uses CMD_EXEC to execute TCL code from a POST request." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://psytester.github.io/CVE-2019-14984/", "refsource": "MISC", "url": "https://psytester.github.io/CVE-2019-14984/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-14984", "datePublished": "2019-08-13T19:15:17", "dateReserved": "2019-08-12T00:00:00", "dateUpdated": "2024-08-05T00:34:52.992Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-16199
Vulnerability from cvelistv5
Published
2019-09-17 20:53
Modified
2024-08-05 01:10
Severity ?
EPSS score ?
Summary
eQ-3 Homematic CCU2 before 2.47.18 and CCU3 before 3.47.18 allow Remote Code Execution by unauthenticated attackers with access to the web interface via an HTTP POST request to certain URLs related to the ReGa core process.
References
▼ | URL | Tags |
---|---|---|
https://psytester.github.io/CVE-2019-16199/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T01:10:41.532Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://psytester.github.io/CVE-2019-16199/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "eQ-3 Homematic CCU2 before 2.47.18 and CCU3 before 3.47.18 allow Remote Code Execution by unauthenticated attackers with access to the web interface via an HTTP POST request to certain URLs related to the ReGa core process." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-09-17T20:53:22", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://psytester.github.io/CVE-2019-16199/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-16199", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "eQ-3 Homematic CCU2 before 2.47.18 and CCU3 before 3.47.18 allow Remote Code Execution by unauthenticated attackers with access to the web interface via an HTTP POST request to certain URLs related to the ReGa core process." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://psytester.github.io/CVE-2019-16199/", "refsource": "MISC", "url": "https://psytester.github.io/CVE-2019-16199/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-16199", "datePublished": "2019-09-17T20:53:22", "dateReserved": "2019-09-09T00:00:00", "dateUpdated": "2024-08-05T01:10:41.532Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-15850
Vulnerability from cvelistv5
Published
2019-10-17 13:38
Modified
2024-08-05 01:03
Severity ?
EPSS score ?
Summary
eQ-3 HomeMatic CCU3 firmware version 3.41.11 allows Remote Code Execution in the ReGa.runScript method. An authenticated attacker can easily execute code and compromise the system.
References
▼ | URL | Tags |
---|---|---|
https://www.eq-3.com/products/homematic.html | x_refsource_MISC | |
https://noskill1337.github.io/homematic-ccu3-remote-code-execution | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T01:03:30.897Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.eq-3.com/products/homematic.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://noskill1337.github.io/homematic-ccu3-remote-code-execution" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "eQ-3 HomeMatic CCU3 firmware version 3.41.11 allows Remote Code Execution in the ReGa.runScript method. An authenticated attacker can easily execute code and compromise the system." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-10-17T13:38:15", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.eq-3.com/products/homematic.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://noskill1337.github.io/homematic-ccu3-remote-code-execution" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-15850", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "eQ-3 HomeMatic CCU3 firmware version 3.41.11 allows Remote Code Execution in the ReGa.runScript method. An authenticated attacker can easily execute code and compromise the system." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.eq-3.com/products/homematic.html", "refsource": "MISC", "url": "https://www.eq-3.com/products/homematic.html" }, { "name": "https://noskill1337.github.io/homematic-ccu3-remote-code-execution", "refsource": "MISC", "url": "https://noskill1337.github.io/homematic-ccu3-remote-code-execution" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-15850", "datePublished": "2019-10-17T13:38:15", "dateReserved": "2019-09-02T00:00:00", "dateUpdated": "2024-08-05T01:03:30.897Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-18939
Vulnerability from cvelistv5
Published
2019-11-14 18:53
Modified
2024-08-05 02:02
Severity ?
EPSS score ?
Summary
eQ-3 Homematic CCU2 2.47.20 and CCU3 3.47.18 with the HM-Print AddOn through 1.2a installed allow Remote Code Execution by unauthenticated attackers with access to the web interface via the exec.cgi and exec1.cgi scripts, which execute TCL script content from an HTTP POST request.
References
▼ | URL | Tags |
---|---|---|
https://psytester.github.io/CVE-2019-18939/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T02:02:39.744Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://psytester.github.io/CVE-2019-18939/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "eQ-3 Homematic CCU2 2.47.20 and CCU3 3.47.18 with the HM-Print AddOn through 1.2a installed allow Remote Code Execution by unauthenticated attackers with access to the web interface via the exec.cgi and exec1.cgi scripts, which execute TCL script content from an HTTP POST request." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-11-14T18:53:08", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://psytester.github.io/CVE-2019-18939/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-18939", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "eQ-3 Homematic CCU2 2.47.20 and CCU3 3.47.18 with the HM-Print AddOn through 1.2a installed allow Remote Code Execution by unauthenticated attackers with access to the web interface via the exec.cgi and exec1.cgi scripts, which execute TCL script content from an HTTP POST request." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://psytester.github.io/CVE-2019-18939/", "refsource": "MISC", "url": "https://psytester.github.io/CVE-2019-18939/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-18939", "datePublished": "2019-11-14T18:53:08", "dateReserved": "2019-11-13T00:00:00", "dateUpdated": "2024-08-05T02:02:39.744Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-14985
Vulnerability from cvelistv5
Published
2019-08-13 19:17
Modified
2024-08-05 00:34
Severity ?
EPSS score ?
Summary
eQ-3 Homematic CCU2 and CCU3 with the CUxD AddOn installed allow Remote Code Execution by unauthenticated attackers with access to the web interface, because this interface can access the CMD_EXEC virtual device type 28.
References
▼ | URL | Tags |
---|---|---|
https://psytester.github.io/CVE-2019-14985/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T00:34:52.995Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://psytester.github.io/CVE-2019-14985/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "eQ-3 Homematic CCU2 and CCU3 with the CUxD AddOn installed allow Remote Code Execution by unauthenticated attackers with access to the web interface, because this interface can access the CMD_EXEC virtual device type 28." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-08-13T19:17:52", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://psytester.github.io/CVE-2019-14985/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-14985", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "eQ-3 Homematic CCU2 and CCU3 with the CUxD AddOn installed allow Remote Code Execution by unauthenticated attackers with access to the web interface, because this interface can access the CMD_EXEC virtual device type 28." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://psytester.github.io/CVE-2019-14985/", "refsource": "MISC", "url": "https://psytester.github.io/CVE-2019-14985/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-14985", "datePublished": "2019-08-13T19:17:52", "dateReserved": "2019-08-12T00:00:00", "dateUpdated": "2024-08-05T00:34:52.995Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-33032
Vulnerability from cvelistv5
Published
2021-07-22 17:45
Modified
2024-08-03 23:42
Severity ?
EPSS score ?
Summary
A Remote Code Execution (RCE) vulnerability in the WebUI component of the eQ-3 HomeMatic CCU2 firmware up to and including version 2.57.5 and CCU3 firmware up to and including version 3.57.5 allows remote unauthenticated attackers to execute system commands as root via a simple HTTP request.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T23:42:19.135Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://novag.github.io/posts/homematic-unauthenticated-remote-code-execution/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.eq-3.de/downloads/software/HM-CCU2-Firmware_Updates/HM-CCU-2.59.7/HM-CCU2-Changelog.2.59.7.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.eq-3.de/downloads/software/firmware/ccu3-firmware/CCU3-Changelog.3.59.6.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "A Remote Code Execution (RCE) vulnerability in the WebUI component of the eQ-3 HomeMatic CCU2 firmware up to and including version 2.57.5 and CCU3 firmware up to and including version 3.57.5 allows remote unauthenticated attackers to execute system commands as root via a simple HTTP request." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-07-30T20:25:10", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://novag.github.io/posts/homematic-unauthenticated-remote-code-execution/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.eq-3.de/downloads/software/HM-CCU2-Firmware_Updates/HM-CCU-2.59.7/HM-CCU2-Changelog.2.59.7.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.eq-3.de/downloads/software/firmware/ccu3-firmware/CCU3-Changelog.3.59.6.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-33032", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A Remote Code Execution (RCE) vulnerability in the WebUI component of the eQ-3 HomeMatic CCU2 firmware up to and including version 2.57.5 and CCU3 firmware up to and including version 3.57.5 allows remote unauthenticated attackers to execute system commands as root via a simple HTTP request." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://novag.github.io/posts/homematic-unauthenticated-remote-code-execution/", "refsource": "MISC", "url": "https://novag.github.io/posts/homematic-unauthenticated-remote-code-execution/" }, { "name": "https://www.eq-3.de/downloads/software/HM-CCU2-Firmware_Updates/HM-CCU-2.59.7/HM-CCU2-Changelog.2.59.7.pdf", "refsource": "MISC", "url": "https://www.eq-3.de/downloads/software/HM-CCU2-Firmware_Updates/HM-CCU-2.59.7/HM-CCU2-Changelog.2.59.7.pdf" }, { "name": "https://www.eq-3.de/downloads/software/firmware/ccu3-firmware/CCU3-Changelog.3.59.6.pdf", "refsource": "MISC", "url": "https://www.eq-3.de/downloads/software/firmware/ccu3-firmware/CCU3-Changelog.3.59.6.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-33032", "datePublished": "2021-07-22T17:45:35", "dateReserved": "2021-05-14T00:00:00", "dateUpdated": "2024-08-03T23:42:19.135Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-9583
Vulnerability from cvelistv5
Published
2019-08-14 19:47
Modified
2024-08-04 21:54
Severity ?
EPSS score ?
Summary
eQ-3 Homematic CCU2 and CCU3 obtain session IDs without login. This allows a Denial of Service and is a starting point for other attacks. Affected versions for CCU2: 2.35.16, 2.41.5, 2.41.8, 2.41.9, 2.45.6, 2.45.7, 2.47.10, 2.47.12, 2.47.15. Affected versions for CCU3: 3.41.11, 3.43.16, 3.45.5, 3.45.7, 3.47.10, 3.47.15.
References
▼ | URL | Tags |
---|---|---|
https://github.com/psytester/psytester.github.io/blob/master/_posts/hacking_and_pentests/CVEs/2019-03-27-CVE-2019-9583.md | x_refsource_MISC | |
https://psytester.github.io/CVE-2019-9583/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T21:54:44.498Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/psytester/psytester.github.io/blob/master/_posts/hacking_and_pentests/CVEs/2019-03-27-CVE-2019-9583.md" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://psytester.github.io/CVE-2019-9583/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "eQ-3 Homematic CCU2 and CCU3 obtain session IDs without login. This allows a Denial of Service and is a starting point for other attacks. Affected versions for CCU2: 2.35.16, 2.41.5, 2.41.8, 2.41.9, 2.45.6, 2.45.7, 2.47.10, 2.47.12, 2.47.15. Affected versions for CCU3: 3.41.11, 3.43.16, 3.45.5, 3.45.7, 3.47.10, 3.47.15." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-08-14T19:47:54", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/psytester/psytester.github.io/blob/master/_posts/hacking_and_pentests/CVEs/2019-03-27-CVE-2019-9583.md" }, { "tags": [ "x_refsource_MISC" ], "url": "https://psytester.github.io/CVE-2019-9583/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-9583", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "eQ-3 Homematic CCU2 and CCU3 obtain session IDs without login. This allows a Denial of Service and is a starting point for other attacks. Affected versions for CCU2: 2.35.16, 2.41.5, 2.41.8, 2.41.9, 2.45.6, 2.45.7, 2.47.10, 2.47.12, 2.47.15. Affected versions for CCU3: 3.41.11, 3.43.16, 3.45.5, 3.45.7, 3.47.10, 3.47.15." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/psytester/psytester.github.io/blob/master/_posts/hacking_and_pentests/CVEs/2019-03-27-CVE-2019-9583.md", "refsource": "MISC", "url": "https://github.com/psytester/psytester.github.io/blob/master/_posts/hacking_and_pentests/CVEs/2019-03-27-CVE-2019-9583.md" }, { "name": "https://psytester.github.io/CVE-2019-9583/", "refsource": "MISC", "url": "https://psytester.github.io/CVE-2019-9583/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-9583", "datePublished": "2019-08-14T19:47:54", "dateReserved": "2019-03-06T00:00:00", "dateUpdated": "2024-08-04T21:54:44.498Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-9584
Vulnerability from cvelistv5
Published
2019-08-14 20:03
Modified
2024-08-04 21:54
Severity ?
EPSS score ?
Summary
eQ-3 Homematic AddOn 'CloudMatic' on CCU2 and CCU3 allows uncontrolled admin access, resulting in the ability to obtain VPN profile details, shutting down the VPN service and to delete the VPN service configuration. This is related to improper access control for all /addons/mh/ pages.
References
▼ | URL | Tags |
---|---|---|
https://github.com/psytester/psytester.github.io/blob/master/_posts/hacking_and_pentests/CVEs/2019-03-27-CVE-2019-9584.md | x_refsource_MISC | |
https://psytester.github.io/CVE-2019-9584/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T21:54:44.866Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/psytester/psytester.github.io/blob/master/_posts/hacking_and_pentests/CVEs/2019-03-27-CVE-2019-9584.md" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://psytester.github.io/CVE-2019-9584/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "eQ-3 Homematic AddOn \u0027CloudMatic\u0027 on CCU2 and CCU3 allows uncontrolled admin access, resulting in the ability to obtain VPN profile details, shutting down the VPN service and to delete the VPN service configuration. This is related to improper access control for all /addons/mh/ pages." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-08-14T20:03:06", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/psytester/psytester.github.io/blob/master/_posts/hacking_and_pentests/CVEs/2019-03-27-CVE-2019-9584.md" }, { "tags": [ "x_refsource_MISC" ], "url": "https://psytester.github.io/CVE-2019-9584/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-9584", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "eQ-3 Homematic AddOn \u0027CloudMatic\u0027 on CCU2 and CCU3 allows uncontrolled admin access, resulting in the ability to obtain VPN profile details, shutting down the VPN service and to delete the VPN service configuration. This is related to improper access control for all /addons/mh/ pages." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/psytester/psytester.github.io/blob/master/_posts/hacking_and_pentests/CVEs/2019-03-27-CVE-2019-9584.md", "refsource": "MISC", "url": "https://github.com/psytester/psytester.github.io/blob/master/_posts/hacking_and_pentests/CVEs/2019-03-27-CVE-2019-9584.md" }, { "name": "https://psytester.github.io/CVE-2019-9584/", "refsource": "MISC", "url": "https://psytester.github.io/CVE-2019-9584/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-9584", "datePublished": "2019-08-14T20:03:06", "dateReserved": "2019-03-06T00:00:00", "dateUpdated": "2024-08-04T21:54:44.866Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }