4.3
CVE-2020-9462
- EPSS 0.04%
- Veröffentlicht 04.06.2020 16:15:13
- Zuletzt bearbeitet 21.11.2024 05:40:41
- Quelle cve@mitre.org
- CVE-Watchlists
- Unerledigt
An issue was discovered in all Athom Homey and Homey Pro devices up to the current version 4.2.0. An attacker within RF range can obtain a cleartext copy of the network configuration of the device, including the Wi-Fi PSK, during device setup. Upon success, the attacker is able to further infiltrate the target's Wi-Fi networks.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Homey ≫ Homey Firmware Version < 4.2.0
Homey ≫ Homey Pro Firmware Version < 4.2.0
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.04% | 0.094 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 4.3 | 2.8 | 1.4 |
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
|
| nvd@nist.gov | 3.3 | 6.5 | 2.9 |
AV:A/AC:L/Au:N/C:P/I:N/A:N
|
CWE-312 Cleartext Storage of Sensitive Information
The product stores sensitive information in cleartext within a resource that might be accessible to another control sphere.