Логотип exploitDog
bind:CVE-2019-10119
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2019-10119

Количество 2

Количество 2

nvd логотип

CVE-2019-10119

больше 6 лет назад

eQ-3 HomeMatic CCU2 devices before 2.41.8 and CCU3 devices before 3.43.16 use session IDs for authentication but lack authorization checks. An attacker can obtain a session ID via an invalid login attempt to the RemoteApi account, aka HMCCU-154. This leads to automatic login as admin.

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-fp3q-2pxv-43rj

больше 3 лет назад

eQ-3 HomeMatic CCU2 devices before 2.41.8 and CCU3 devices before 3.43.16 use session IDs for authentication but lack authorization checks. An attacker can obtain a session ID via an invalid login attempt to the RemoteApi account, aka HMCCU-154. This leads to automatic login as admin.

CVSS3: 9.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2019-10119

eQ-3 HomeMatic CCU2 devices before 2.41.8 and CCU3 devices before 3.43.16 use session IDs for authentication but lack authorization checks. An attacker can obtain a session ID via an invalid login attempt to the RemoteApi account, aka HMCCU-154. This leads to automatic login as admin.

CVSS3: 9.8
0%
Низкий
больше 6 лет назад
github логотип
GHSA-fp3q-2pxv-43rj

eQ-3 HomeMatic CCU2 devices before 2.41.8 and CCU3 devices before 3.43.16 use session IDs for authentication but lack authorization checks. An attacker can obtain a session ID via an invalid login attempt to the RemoteApi account, aka HMCCU-154. This leads to automatic login as admin.

CVSS3: 9.8
0%
Низкий
больше 3 лет назад

Уязвимостей на страницу