← Back to CVEs
CVE-2020-27488
CRITICAL9.8
Description
Loxone Miniserver devices with firmware before 11.1 (aka 11.1.9.3) are unable to use an authentication method that is based on the "signature of the update package." Therefore, these devices (or attackers who are spoofing these devices) can continue to use an unauthenticated cloud service for an indeterminate time period (possibly forever). Once an individual device's firmware is updated, and authentication occurs once, the cloud service recategorizes the device so that authentication is subsequently always required, and spoofing cannot occur.
CVE Details
CVSS v3.1 Score9.8
SeverityCRITICAL
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredNONE
User InteractionNONE
Published1/13/2021
Last Modified11/21/2024
Sourcenvd
Honeypot Sightings0
Affected Products
loxone:miniserver_gen_1loxone:miniserver_gen_1_firmware
Weaknesses (CWE)
CWE-287
References
https://www.loxone.com/dede/sicherheit-cloud-dns/(cve@mitre.org)
https://www.loxone.com/enen/security-cloud-dns/(cve@mitre.org)
https://iot-lab-fh-ooe.github.io/loxone_clouddns_schwachstelle/(af854a3a-2127-422b-91ae-364da2661108)
https://iot-lab-fh-ooe.github.io/loxone_clouddns_vulnerability/(af854a3a-2127-422b-91ae-364da2661108)
https://www.loxone.com/dede/sicherheit-cloud-dns/(af854a3a-2127-422b-91ae-364da2661108)
https://www.loxone.com/enen/security-cloud-dns/(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.