← Volver a CVEs
CVE-2020-27488
CRITICAL9.8
Descripcion
Loxone Miniserver devices with firmware before 11.1 (aka 11.1.9.3) are unable to use an authentication method that is based on the "signature of the update package." Therefore, these devices (or attackers who are spoofing these devices) can continue to use an unauthenticated cloud service for an indeterminate time period (possibly forever). Once an individual device's firmware is updated, and authentication occurs once, the cloud service recategorizes the device so that authentication is subsequently always required, and spoofing cannot occur.
Detalles CVE
Puntuacion CVSS v3.19.8
SeveridadCRITICAL
Vector CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Vector de ataqueNETWORK
ComplejidadLOW
Privilegios requeridosNONE
Interaccion usuarioNONE
Publicado1/13/2021
Ultima modificacion11/21/2024
Fuentenvd
Avistamientos honeypot0
Productos afectados
loxone:miniserver_gen_1loxone:miniserver_gen_1_firmware
Debilidades (CWE)
CWE-287
Referencias
https://www.loxone.com/dede/sicherheit-cloud-dns/(cve@mitre.org)
https://www.loxone.com/enen/security-cloud-dns/(cve@mitre.org)
https://iot-lab-fh-ooe.github.io/loxone_clouddns_schwachstelle/(af854a3a-2127-422b-91ae-364da2661108)
https://iot-lab-fh-ooe.github.io/loxone_clouddns_vulnerability/(af854a3a-2127-422b-91ae-364da2661108)
https://www.loxone.com/dede/sicherheit-cloud-dns/(af854a3a-2127-422b-91ae-364da2661108)
https://www.loxone.com/enen/security-cloud-dns/(af854a3a-2127-422b-91ae-364da2661108)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.