Описание
eQ-3 HomeMatic CCU2 devices before 2.41.8 and CCU3 devices before 3.43.15 use session IDs for authentication but lack authorization checks. An attacker can obtain a session ID via the user authentication dialogue, aka HMCCU-153. This leads to automatic login as admin.
Ссылки
- Broken Link
- Release NotesVendor Advisory
- Release NotesVendor Advisory
- Broken Link
- Release NotesVendor Advisory
- Release NotesVendor Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 3.43.15 (исключая)
Одновременно
cpe:2.3:o:eq-3:ccu3_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:eq-3:ccu3:-:*:*:*:*:*:*:*
Конфигурация 2Версия до 2.41.8 (исключая)
Одновременно
cpe:2.3:o:eq-3:ccu2_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:eq-3:ccu2:-:*:*:*:*:*:*:*
EPSS
Процентиль: 59%
0.00382
Низкий
9.8 Critical
CVSS3
7.5 High
CVSS2
Дефекты
CWE-306
Связанные уязвимости
CVSS3: 9.8
github
больше 3 лет назад
eQ-3 HomeMatic CCU2 devices before 2.41.8 and CCU3 devices before 3.43.15 use session IDs for authentication but lack authorization checks. An attacker can obtain a session ID via the user authentication dialogue, aka HMCCU-153. This leads to automatic login as admin.
EPSS
Процентиль: 59%
0.00382
Низкий
9.8 Critical
CVSS3
7.5 High
CVSS2
Дефекты
CWE-306