← Back to CVEs
CVE-2023-41894
MEDIUM5.3
Description
Home assistant is an open source home automation. The assessment verified that webhooks available in the webhook component are triggerable via the `*.ui.nabu.casa` URL without authentication, even when the webhook is marked as Only accessible from the local network. This issue is facilitated by the SniTun proxy, which sets the source address to 127.0.0.1 on all requests sent to the public URL and forwarded to the local Home Assistant. This issue has been addressed in version 2023.9.0 and all users are advised to upgrade. There are no known workarounds for this vulnerability.
CVE Details
CVSS v3.1 Score5.3
SeverityMEDIUM
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredNONE
User InteractionNONE
Published10/20/2023
Last Modified11/21/2024
Sourcenvd
Honeypot Sightings0
Affected Products
home-assistant:home-assistant
Weaknesses (CWE)
CWE-669
References
https://github.com/home-assistant/core/security/advisories/GHSA-wx3j-3v2j-rf45(security-advisories@github.com)
https://www.home-assistant.io/blog/2023/10/19/security-audits-of-home-assistant/(security-advisories@github.com)
https://github.com/home-assistant/core/security/advisories/GHSA-wx3j-3v2j-rf45(af854a3a-2127-422b-91ae-364da2661108)
https://www.home-assistant.io/blog/2023/10/19/security-audits-of-home-assistant/(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.