cve/2018/CVE-2018-3833.md

19 lines
1.1 KiB
Markdown
Raw Normal View History

2024-05-26 14:27:05 +02:00
### [CVE-2018-3833](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3833)
![](https://img.shields.io/static/v1?label=Product&message=Insteon&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Improper%20Access%20Control&color=brighgreen)
### Description
An exploitable firmware downgrade vulnerability exists in Insteon Hub running firmware version 1013. The firmware upgrade functionality, triggered via PubNub, retrieves signed firmware binaries using plain HTTP requests. The device doesn't check the firmware version that is going to be installed and thus allows for flashing older firmware images. To trigger this vulnerability, an attacker needs to impersonate the remote server 'cache.insteon.com' and serve any signed firmware image.
### POC
#### Reference
- https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0512
2024-06-09 00:33:16 +00:00
- https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0512
2024-05-26 14:27:05 +02:00
#### Github
No PoCs found on GitHub currently.