cve/2018/CVE-2018-3833.md

18 lines
1003 B
Markdown
Raw Normal View History

2024-05-26 14:27:05 +02:00
### [CVE-2018-3833](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3833)
![](https://img.shields.io/static/v1?label=Product&message=Insteon&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Improper%20Access%20Control&color=brighgreen)
### Description
An exploitable firmware downgrade vulnerability exists in Insteon Hub running firmware version 1013. The firmware upgrade functionality, triggered via PubNub, retrieves signed firmware binaries using plain HTTP requests. The device doesn't check the firmware version that is going to be installed and thus allows for flashing older firmware images. To trigger this vulnerability, an attacker needs to impersonate the remote server 'cache.insteon.com' and serve any signed firmware image.
### POC
#### Reference
- https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0512
#### Github
No PoCs found on GitHub currently.