Loxone Miniserver devices with firmware before 11.1 (aka 11.1.9.3) are unable to use an authentication method that is based on the "signature of the update package." Therefore, these devices (or attackers who are spoofing these devices) can continue to use an unauthenticated cloud service for an indeterminate time period (possibly forever). Once an individual device's firmware is updated, and authentication occurs once, the cloud service recategorizes the device so that authentication is subsequently always required, and spoofing cannot occur.
References
Link | Resource |
---|---|
https://iot-lab-fh-ooe.github.io/loxone_clouddns_vulnerability/ | Exploit Third Party Advisory |
https://iot-lab-fh-ooe.github.io/loxone_clouddns_schwachstelle/ | Exploit Third Party Advisory |
https://www.loxone.com/dede/sicherheit-cloud-dns/ | Product Vendor Advisory |
https://www.loxone.com/enen/security-cloud-dns/ | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Information
Published : 2021-01-13 12:15
Updated : 2021-01-21 08:58
NVD link : CVE-2020-27488
Mitre link : CVE-2020-27488
JSON object : View
CWE
CWE-287
Improper Authentication
Products Affected
loxone
- miniserver_gen_1_firmware
- miniserver_gen_1