Eq-3

Ccu2 Firmware

8 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 5.91%
  • Veröffentlicht 17.10.2019 14:15:10
  • Zuletzt bearbeitet 21.11.2024 04:26:43

A Remote Code Execution (RCE) issue in the addon CUx-Daemon 1.11a of the eQ-3 Homematic CCU-Firmware 2.35.16 until 2.45.6 allows remote authenticated attackers to execute system commands as root remotely via a simple HTTP request.

Exploit
  • EPSS 0.24%
  • Veröffentlicht 17.10.2019 14:15:10
  • Zuletzt bearbeitet 21.11.2024 04:26:43

A Local File Inclusion (LFI) issue in the addon CUx-Daemon 1.11a of the eQ-3 Homematic CCU-Firmware 2.35.16 until 2.45.6 allows remote authenticated attackers to read sensitive files via a simple HTTP Request.

Exploit
  • EPSS 0.62%
  • Veröffentlicht 06.08.2019 19:15:13
  • Zuletzt bearbeitet 21.11.2024 04:26:49

eQ-3 Homematic CCU2 and CCU3 use session IDs for authentication but lack authorization checks. Consequently, a valid guest level or user level account can create a new admin level account, read the service messages, clear the system protocol or modif...

Exploit
  • EPSS 0.49%
  • Veröffentlicht 05.08.2019 20:15:11
  • Zuletzt bearbeitet 21.11.2024 04:26:49

eQ-3 Homematic CCU2 2.47.15 and prior and CCU3 3.47.15 and prior use session IDs for authentication but lack authorization checks. An attacker can obtain a session ID from CVE-2019-9583, resulting in the ability to read the service messages, clear th...

  • EPSS 0.27%
  • Veröffentlicht 10.07.2019 12:15:12
  • Zuletzt bearbeitet 21.11.2024 04:18:27

eQ-3 HomeMatic CCU2 devices before 2.41.8 and CCU3 devices before 3.43.16 use session IDs for authentication but lack authorization checks. An attacker can obtain a session ID via an invalid login attempt to the RemoteApi account, aka HMCCU-154. This...

  • EPSS 0.18%
  • Veröffentlicht 10.07.2019 12:15:12
  • Zuletzt bearbeitet 21.11.2024 04:18:27

On eQ-3 HomeMatic CCU2 devices before 2.41.8 and CCU3 devices before 3.43.16, automatic login configuration (aka setAutoLogin) can be achieved by continuing to use a session ID after a logout, aka HMCCU-154.

  • EPSS 0.38%
  • Veröffentlicht 10.07.2019 12:15:12
  • Zuletzt bearbeitet 21.11.2024 04:18:27

eQ-3 HomeMatic CCU2 devices before 2.41.8 and CCU3 devices before 3.43.15 use session IDs for authentication but lack authorization checks. An attacker can obtain a session ID via the user authentication dialogue, aka HMCCU-153. This leads to automat...

  • EPSS 3.51%
  • Veröffentlicht 10.07.2019 12:15:12
  • Zuletzt bearbeitet 21.11.2024 04:18:27

eQ-3 HomeMatic CCU2 devices before 2.41.9 and CCU3 devices before 3.43.16 have buffer overflows in the ReGa ise GmbH HTTP-Server 2.0 component, aka HMCCU-179. This may lead to remote code execution.