In Fibaro Home Center 2 and Lite devices in all versions provide a web based management interface over unencrypted HTTP protocol. Communication between the user and the device can be eavesdropped to hijack sessions, tokens and passwords.
References
Link | Resource |
---|---|
https://www.iot-inspector.com/blog/advisory-fibaro-home-center/ | Exploit Third Party Advisory |
http://seclists.org/fulldisclosure/2021/Apr/27 | Mailing List Third Party Advisory |
http://packetstormsecurity.com/files/162243/Fibaro-Home-Center-MITM-Missing-Authentication-Code-Execution.html | Exploit Third Party Advisory VDB Entry |
Information
Published : 2021-04-19 07:15
Updated : 2021-04-23 09:08
NVD link : CVE-2021-20992
Mitre link : CVE-2021-20992
JSON object : View
CWE
CWE-319
Cleartext Transmission of Sensitive Information
Products Affected
fibaro
- home_center_2_firmware
- home_center_lite
- home_center_2
- home_center_lite_firmware