Vulnerability CVE-2021-20989


Published: 2021-04-19

Description:
Fibaro Home Center 2 and Lite devices with firmware version 4.600 and older initiate SSH connections to the Fibaro cloud to provide remote access and remote support capabilities. This connection can be intercepted using DNS spoofing attack and a device initiated remote port-forward channel can be used to connect to the web management interface. Knowledge of authorization credentials to the management interface is required to perform any further actions.

See advisories in our WLB2 database:
Topic
Author
Date
Med.
Fibaro Home Center MITM / Missing Authentication / Code Execution
Marton Illes
21.04.2021

Type:

CWE-862

(Missing Authorization)

CVSS2 => (AV:N/AC:M/Au:N/C:P/I:N/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
4.3/10
2.9/10
8.6/10
Exploit range
Attack complexity
Authentication
Remote
Medium
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
None
None

 References:
https://www.iot-inspector.com/blog/advisory-fibaro-home-center/
http://seclists.org/fulldisclosure/2021/Apr/27
http://packetstormsecurity.com/files/162243/Fibaro-Home-Center-MITM-Missing-Authentication-Code-Execution.html

Copyright 2024, cxsecurity.com

 

Back to Top