Show filters
32 Total Results
Displaying 21-30 of 32
Sort by:
Attacker Value
Unknown

CVE-2019-10119

Disclosure Date: July 10, 2019 (last updated November 27, 2024)
eQ-3 HomeMatic CCU2 devices before 2.41.8 and CCU3 devices before 3.43.16 use session IDs for authentication but lack authorization checks. An attacker can obtain a session ID via an invalid login attempt to the RemoteApi account, aka HMCCU-154. This leads to automatic login as admin.
0
Attacker Value
Unknown

CVE-2019-10121

Disclosure Date: July 10, 2019 (last updated November 27, 2024)
eQ-3 HomeMatic CCU2 devices before 2.41.8 and CCU3 devices before 3.43.15 use session IDs for authentication but lack authorization checks. An attacker can obtain a session ID via the user authentication dialogue, aka HMCCU-153. This leads to automatic login as admin.
0
Attacker Value
Unknown

CVE-2019-10120

Disclosure Date: July 10, 2019 (last updated November 27, 2024)
On eQ-3 HomeMatic CCU2 devices before 2.41.8 and CCU3 devices before 3.43.16, automatic login configuration (aka setAutoLogin) can be achieved by continuing to use a session ID after a logout, aka HMCCU-154.
0
Attacker Value
Unknown

CVE-2019-10122

Disclosure Date: July 10, 2019 (last updated November 27, 2024)
eQ-3 HomeMatic CCU2 devices before 2.41.9 and CCU3 devices before 3.43.16 have buffer overflows in the ReGa ise GmbH HTTP-Server 2.0 component, aka HMCCU-179. This may lead to remote code execution.
0
Attacker Value
Unknown

CVE-2019-9727

Disclosure Date: May 13, 2019 (last updated November 27, 2024)
Unauthenticated password hash disclosure in the User.getUserPWD method in eQ-3 AG Homematic CCU3 3.43.15 and earlier allows remote attackers to retrieve the GUI password hashes of GUI users. This vulnerability can be exploited by unauthenticated attackers with access to the web interface.
0
Attacker Value
Unknown

CVE-2019-9726

Disclosure Date: May 13, 2019 (last updated November 27, 2024)
Directory Traversal / Arbitrary File Read in eQ-3 AG Homematic CCU3 3.43.15 and earlier allows remote attackers to read arbitrary files of the device's filesystem. This vulnerability can be exploited by unauthenticated attackers with access to the web interface.
0
Attacker Value
Unknown

CVE-2018-7301

Disclosure Date: February 22, 2018 (last updated November 26, 2024)
eQ-3 AG HomeMatic CCU2 2.29.22 devices have an open XML-RPC port without authentication. This can be exploited by sending arbitrary XML-RPC requests to control the attached BidCos devices.
0
Attacker Value
Unknown

CVE-2018-7299

Disclosure Date: February 22, 2018 (last updated November 26, 2024)
Remote Code Execution in the addon installation process in eQ-3 AG Homematic CCU2 2.29.2 and earlier allows authenticated attackers to create or overwrite arbitrary files or install malicious software on the device.
0
Attacker Value
Unknown

CVE-2018-7298

Disclosure Date: February 22, 2018 (last updated November 26, 2024)
In /usr/local/etc/config/addons/mh/loopupd.sh on eQ-3 AG HomeMatic CCU2 2.29.22 devices, software update packages are downloaded via the HTTP protocol, which does not provide any cryptographic protection of the downloaded contents. An attacker with a privileged network position (which could be obtained via DNS spoofing of www.meine-homematic.de or other approaches) can exploit this issue in order to provide arbitrary malicious firmware updates to the CCU2. This can result in a full system compromise.
0
Attacker Value
Unknown

CVE-2018-7296

Disclosure Date: February 22, 2018 (last updated November 26, 2024)
Directory Traversal / Arbitrary File Read in User.getLanguage method in eQ-3 AG Homematic CCU2 2.29.2 and earlier allows remote attackers to read the first line of an arbitrary file on the CCU2's filesystem. This vulnerability can be exploited by unauthenticated attackers with access to the web interface.
0