Lucene search

K

Ccu2 Firmware Security Vulnerabilities

cve
cve

CVE-2019-10119

eQ-3 HomeMatic CCU2 devices before 2.41.8 and CCU3 devices before 3.43.16 use session IDs for authentication but lack authorization checks. An attacker can obtain a session ID via an invalid login attempt to the RemoteApi account, aka HMCCU-154. This leads to automatic login as admin.

9.8CVSS

9.4AI Score

0.002EPSS

2019-07-10 12:15 PM
26
cve
cve

CVE-2019-10120

On eQ-3 HomeMatic CCU2 devices before 2.41.8 and CCU3 devices before 3.43.16, automatic login configuration (aka setAutoLogin) can be achieved by continuing to use a session ID after a logout, aka HMCCU-154.

8.8CVSS

8.6AI Score

0.001EPSS

2019-07-10 12:15 PM
31
cve
cve

CVE-2019-10121

eQ-3 HomeMatic CCU2 devices before 2.41.8 and CCU3 devices before 3.43.15 use session IDs for authentication but lack authorization checks. An attacker can obtain a session ID via the user authentication dialogue, aka HMCCU-153. This leads to automatic login as admin.

9.8CVSS

9.4AI Score

0.006EPSS

2019-07-10 12:15 PM
23
cve
cve

CVE-2019-10122

eQ-3 HomeMatic CCU2 devices before 2.41.9 and CCU3 devices before 3.43.16 have buffer overflows in the ReGa ise GmbH HTTP-Server 2.0 component, aka HMCCU-179. This may lead to remote code execution.

9.8CVSS

9.8AI Score

0.019EPSS

2019-07-10 12:15 PM
33
cve
cve

CVE-2019-14423

A Remote Code Execution (RCE) issue in the addon CUx-Daemon 1.11a of the eQ-3 Homematic CCU-Firmware 2.35.16 until 2.45.6 allows remote authenticated attackers to execute system commands as root remotely via a simple HTTP request.

8.8CVSS

8.7AI Score

0.019EPSS

2019-10-17 02:15 PM
27
cve
cve

CVE-2019-14424

A Local File Inclusion (LFI) issue in the addon CUx-Daemon 1.11a of the eQ-3 Homematic CCU-Firmware 2.35.16 until 2.45.6 allows remote authenticated attackers to read sensitive files via a simple HTTP Request.

6.5CVSS

6AI Score

0.005EPSS

2019-10-17 02:15 PM
35
cve
cve

CVE-2019-14473

eQ-3 Homematic CCU2 and CCU3 use session IDs for authentication but lack authorization checks. Consequently, a valid guest level or user level account can create a new admin level account, read the service messages, clear the system protocol or modify/delete internal programs, etc. pp.

8.8CVSS

8.7AI Score

0.001EPSS

2019-08-06 07:15 PM
29
cve
cve

CVE-2019-14475

eQ-3 Homematic CCU2 2.47.15 and prior and CCU3 3.47.15 and prior use session IDs for authentication but lack authorization checks. An attacker can obtain a session ID from CVE-2019-9583, resulting in the ability to read the service messages, clear the system protocol, create a new user in the syste...

7.5CVSS

7.5AI Score

0.006EPSS

2019-08-05 08:15 PM
43