8.1

CVE-2018-15478

An issue was discovered in myStrom WiFi Switch V1 before 2.66, WiFi Switch V2 before 3.80, WiFi Switch EU before 3.80, WiFi Bulb before 2.58, WiFi LED Strip before 3.80, WiFi Button before 2.73, and WiFi Button Plus before 2.73. The process of registering a device with a cloud account was based on an activation code derived from the device MAC address. By guessing valid MAC addresses or using MAC addresses printed on devices in shops and reverse engineering the protocol, an attacker would have been able to register previously unregistered devices to their account. When the rightful owner would have connected them after purchase to their WiFi network, the devices would not have registered with their account, would subsequently not have been controllable from the owner's mobile app, and would not have been visible in the owner's account. Instead, they would have been under control of the attacker.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
MystromWifi Switch Firmware Version < 2.66
   MystromWifi Switch Versionv1
MystromWifi Switch Firmware Version < 3.80
   MystromWifi Switch Versionv2
MystromWifi Button Plus Firmware Version < 2.73
   MystromWifi Button Plus Version-
MystromWifi Button Firmware Version < 2.73
   MystromWifi Button Version-
MystromWifi Switch Eu Firmware Version < 3.80
   MystromWifi Switch Eu Version-
MystromWifi Bulb Firmware Version < 2.58
   MystromWifi Bulb Version-
MystromWifi Led Strip Firmware Version < 3.80
   MystromWifi Led Strip Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.36% 0.554
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 8.1 2.2 5.9
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
nvd@nist.gov 6.8 8.6 6.4
AV:N/AC:M/Au:N/C:P/I:P/A:P
CWE-287 Improper Authentication

When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.