Eq-3

Ccu3 Firmware

10 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 45.81%
  • Veröffentlicht 15.05.2020 17:15:12
  • Zuletzt bearbeitet 21.11.2024 05:00:22

eQ-3 Homematic Central Control Unit (CCU)2 through 2.51.6 and CCU3 through 3.51.6 allow Remote Code Execution in the JSON API Method ReGa.runScript, by unauthenticated attackers with access to the web interface, due to the default auto-login feature ...

Exploit
  • EPSS 0.22%
  • Veröffentlicht 07.08.2019 18:15:13
  • Zuletzt bearbeitet 21.11.2024 04:26:49

eQ-3 Homematic CCU3 3.47.15 and prior has Improper Input Validation in function 'Call()' of ReGa core logic process, resulting in the ability to start a Denial of Service. Due to Improper Authorization an attacker can obtain a session ID from CVE-201...

Exploit
  • EPSS 0.62%
  • Veröffentlicht 06.08.2019 19:15:13
  • Zuletzt bearbeitet 21.11.2024 04:26:49

eQ-3 Homematic CCU2 and CCU3 use session IDs for authentication but lack authorization checks. Consequently, a valid guest level or user level account can create a new admin level account, read the service messages, clear the system protocol or modif...

Exploit
  • EPSS 0.49%
  • Veröffentlicht 05.08.2019 20:15:11
  • Zuletzt bearbeitet 21.11.2024 04:26:49

eQ-3 Homematic CCU2 2.47.15 and prior and CCU3 3.47.15 and prior use session IDs for authentication but lack authorization checks. An attacker can obtain a session ID from CVE-2019-9583, resulting in the ability to read the service messages, clear th...

  • EPSS 0.27%
  • Veröffentlicht 10.07.2019 12:15:12
  • Zuletzt bearbeitet 21.11.2024 04:18:27

eQ-3 HomeMatic CCU2 devices before 2.41.8 and CCU3 devices before 3.43.16 use session IDs for authentication but lack authorization checks. An attacker can obtain a session ID via an invalid login attempt to the RemoteApi account, aka HMCCU-154. This...

  • EPSS 0.18%
  • Veröffentlicht 10.07.2019 12:15:12
  • Zuletzt bearbeitet 21.11.2024 04:18:27

On eQ-3 HomeMatic CCU2 devices before 2.41.8 and CCU3 devices before 3.43.16, automatic login configuration (aka setAutoLogin) can be achieved by continuing to use a session ID after a logout, aka HMCCU-154.

  • EPSS 0.38%
  • Veröffentlicht 10.07.2019 12:15:12
  • Zuletzt bearbeitet 21.11.2024 04:18:27

eQ-3 HomeMatic CCU2 devices before 2.41.8 and CCU3 devices before 3.43.15 use session IDs for authentication but lack authorization checks. An attacker can obtain a session ID via the user authentication dialogue, aka HMCCU-153. This leads to automat...

  • EPSS 3.51%
  • Veröffentlicht 10.07.2019 12:15:12
  • Zuletzt bearbeitet 21.11.2024 04:18:27

eQ-3 HomeMatic CCU2 devices before 2.41.9 and CCU3 devices before 3.43.16 have buffer overflows in the ReGa ise GmbH HTTP-Server 2.0 component, aka HMCCU-179. This may lead to remote code execution.

Exploit
  • EPSS 0.37%
  • Veröffentlicht 13.05.2019 17:29:04
  • Zuletzt bearbeitet 21.11.2024 04:52:11

Unauthenticated password hash disclosure in the User.getUserPWD method in eQ-3 AG Homematic CCU3 3.43.15 and earlier allows remote attackers to retrieve the GUI password hashes of GUI users. This vulnerability can be exploited by unauthenticated atta...

Exploit
  • EPSS 59.72%
  • Veröffentlicht 13.05.2019 17:29:03
  • Zuletzt bearbeitet 21.11.2024 04:52:11

Directory Traversal / Arbitrary File Read in eQ-3 AG Homematic CCU3 3.43.15 and earlier allows remote attackers to read arbitrary files of the device's filesystem. This vulnerability can be exploited by unauthenticated attackers with access to the we...