Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- > [Suggested description]
- > Rubetek SmartHome 2020 devices use
- > unencrypted 433 MHz communication between controllers and beacons, allowing an attacker to sniff and spoof beacon requests remotely.
- >
- > ------------------------------------------
- >
- > [VulnerabilityType Other]
- > Cleartext Transmission of Sensitive Information
- >
- > ------------------------------------------
- >
- > [Vendor of Product]
- > Rubetek
- >
- > ------------------------------------------
- >
- > [Affected Product Code Base]
- > Smarthome USB control module - 2020
- >
- > ------------------------------------------
- >
- > [Affected Component]
- > Firmware of USB control module and smarthome beacons
- >
- > ------------------------------------------
- >
- > [Attack Type]
- > Remote
- >
- > ------------------------------------------
- >
- > [Impact Denial of Service]
- > true
- >
- > ------------------------------------------
- >
- > [Impact Information Disclosure]
- > true
- >
- > ------------------------------------------
- >
- > [CVE Impact Other]
- > data spoofing
- >
- > ------------------------------------------
- >
- > [Attack Vectors]
- > To exploit vulnerability, someone need to buy 433 MHz transceiver module and send special crafted request.
- > Another vector: someone need to buy 433 MHz receiver module and sniff information about anyone's smarthome status.
- >
- > ------------------------------------------
- >
- > [Reference]
- > https://rubetek.com/
- >
- > ------------------------------------------
- >
- > [Discoverer]
- > Ilya Shaposhnikov
- CVE-2020-9550
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement