Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2018-15478

Опубликовано: 30 авг. 2018
Источник: nvd
CVSS3: 8.1
CVSS2: 6.8
EPSS Низкий

Описание

An issue was discovered in myStrom WiFi Switch V1 before 2.66, WiFi Switch V2 before 3.80, WiFi Switch EU before 3.80, WiFi Bulb before 2.58, WiFi LED Strip before 3.80, WiFi Button before 2.73, and WiFi Button Plus before 2.73. The process of registering a device with a cloud account was based on an activation code derived from the device MAC address. By guessing valid MAC addresses or using MAC addresses printed on devices in shops and reverse engineering the protocol, an attacker would have been able to register previously unregistered devices to their account. When the rightful owner would have connected them after purchase to their WiFi network, the devices would not have registered with their account, would subsequently not have been controllable from the owner's mobile app, and would not have been visible in the owner's account. Instead, they would have been under control of the attacker.

Уязвимые конфигурации

Конфигурация 1

Одновременно

cpe:2.3:o:mystrom:wifi_switch_firmware:*:*:*:*:*:*:*:*
Версия до 2.66 (исключая)
cpe:2.3:h:mystrom:wifi_switch:v1:*:*:*:*:*:*:*
Конфигурация 2

Одновременно

cpe:2.3:o:mystrom:wifi_switch_firmware:*:*:*:*:*:*:*:*
Версия до 3.80 (исключая)
cpe:2.3:h:mystrom:wifi_switch:v2:*:*:*:*:*:*:*
Конфигурация 3

Одновременно

cpe:2.3:o:mystrom:wifi_button_plus_firmware:*:*:*:*:*:*:*:*
Версия до 2.73 (исключая)
cpe:2.3:h:mystrom:wifi_button_plus:-:*:*:*:*:*:*:*
Конфигурация 4

Одновременно

cpe:2.3:o:mystrom:wifi_button_firmware:*:*:*:*:*:*:*:*
Версия до 2.73 (исключая)
cpe:2.3:h:mystrom:wifi_button:-:*:*:*:*:*:*:*
Конфигурация 5

Одновременно

cpe:2.3:o:mystrom:wifi_switch_eu_firmware:*:*:*:*:*:*:*:*
Версия до 3.80 (исключая)
cpe:2.3:h:mystrom:wifi_switch_eu:-:*:*:*:*:*:*:*
Конфигурация 6

Одновременно

cpe:2.3:o:mystrom:wifi_bulb_firmware:*:*:*:*:*:*:*:*
Версия до 2.58 (исключая)
cpe:2.3:h:mystrom:wifi_bulb:-:*:*:*:*:*:*:*
Конфигурация 7

Одновременно

cpe:2.3:o:mystrom:wifi_led_strip_firmware:*:*:*:*:*:*:*:*
Версия до 3.80 (исключая)
cpe:2.3:h:mystrom:wifi_led_strip:-:*:*:*:*:*:*:*

EPSS

Процентиль: 58%
0.00363
Низкий

8.1 High

CVSS3

6.8 Medium

CVSS2

Дефекты

CWE-287

Связанные уязвимости

CVSS3: 8.1
github
больше 3 лет назад

An issue was discovered in myStrom WiFi Switch V1 before 2.66, WiFi Switch V2 before 3.80, WiFi Switch EU before 3.80, WiFi Bulb before 2.58, WiFi LED Strip before 3.80, WiFi Button before 2.73, and WiFi Button Plus before 2.73. The process of registering a device with a cloud account was based on an activation code derived from the device MAC address. By guessing valid MAC addresses or using MAC addresses printed on devices in shops and reverse engineering the protocol, an attacker would have been able to register previously unregistered devices to their account. When the rightful owner would have connected them after purchase to their WiFi network, the devices would not have registered with their account, would subsequently not have been controllable from the owner's mobile app, and would not have been visible in the owner's account. Instead, they would have been under control of the attacker.

EPSS

Процентиль: 58%
0.00363
Низкий

8.1 High

CVSS3

6.8 Medium

CVSS2

Дефекты

CWE-287