Overview
Belkin Wemo Home Automation devices contain multiple vulnerabilities.
Description
CWE-321: Use of Hard-coded Cryptographic Key - CVE-2013-6952 Belkin Wemo Home Automation firmware contains a hard-coded cryptographic key and password. An attacker may be able to extract the key and password to sign a malicious firmware update. |
Impact
A remote unauthenticated attacker may be able to sign malicious firmware, relay malicious connections, or access device system files to potentially gain complete access to the device. |
Solution
Update Apps and Firmware |
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | 7.8 | AV:N/AC:M/Au:N/C:P/I:C/A:N |
Temporal | 5.8 | E:POC/RL:OF/RC:UR |
Environmental | 1.5 | CDP:ND/TD:L/CR:ND/IR:ND/AR:ND |
References
- http://www.ioactive.com/pdfs/IOActive_Belkin-advisory-lite.pdf
- http://cwe.mitre.org/data/definitions/611.html
- http://cwe.mitre.org/data/definitions/321.html
- http://cwe.mitre.org/data/definitions/494.html
- http://cwe.mitre.org/data/definitions/441.html
- http://cwe.mitre.org/data/definitions/319.html
- http://www.belkin.com/us/Products/home-automation/c/wemo-home-automation
Acknowledgements
Thanks to Mike Davis of IOActive for reporting these vulnerabilities.
This document was written by Jared Allar.
Other Information
CVE IDs: | CVE-2013-6948, CVE-2013-6949, CVE-2013-6950, CVE-2013-6951, CVE-2013-6952 |
Date Public: | 2013-12-09 |
Date First Published: | 2014-02-18 |
Date Last Updated: | 2014-07-29 22:25 UTC |
Document Revision: | 50 |