CVE-2021-20989
Published Apr 19, 2021
Last updated 2 years ago
Overview
- Description
- Fibaro Home Center 2 and Lite devices with firmware version 4.600 and older initiate SSH connections to the Fibaro cloud to provide remote access and remote support capabilities. This connection can be intercepted using DNS spoofing attack and a device initiated remote port-forward channel can be used to connect to the web management interface. Knowledge of authorization credentials to the management interface is required to perform any further actions.
- Source
- info@cert.vde.com
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 5.9
- Impact score
- 3.6
- Exploitability score
- 2.2
- Vector string
- CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
- Severity
- MEDIUM
CVSS 2.0
- Type
- Primary
- Base score
- 4.3
- Impact score
- 2.9
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:P/I:N/A:N
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:fibaro:home_center_2_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "867FAF63-0352-4AC8-AB9D-1FDEC2E942D4", "versionEndIncluding": "4.600" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:fibaro:home_center_2:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "8021D17B-DD82-46D0-AE92-372649467F1F" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:fibaro:home_center_lite_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A06A908C-D871-46DA-AC42-63FF1518A558", "versionEndIncluding": "4.600" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:fibaro:home_center_lite:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "6A19AFCC-B670-450C-8B64-7770C86B4692" } ], "operator": "OR" } ], "operator": "AND" } ]