Show plain JSON{"id": "CVE-2018-15476", "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 9.3, "accessVector": "NETWORK", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "authentication": "NONE", "integrityImpact": "COMPLETE", "accessComplexity": "MEDIUM", "availabilityImpact": "COMPLETE", "confidentialityImpact": "COMPLETE"}, "acInsufInfo": false, "impactScore": 10.0, "baseSeverity": "HIGH", "obtainAllPrivilege": false, "exploitabilityScore": 8.6, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}], "cvssMetricV30": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.0", "baseScore": 8.1, "attackVector": "NETWORK", "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "HIGH", "availabilityImpact": "HIGH", "privilegesRequired": "NONE", "confidentialityImpact": "HIGH"}, "impactScore": 5.9, "exploitabilityScore": 2.2}]}, "published": "2018-08-30T17:29:01.143", "references": [{"url": "https://www.swisscom.ch/content/dam/swisscom/de/about/nachhaltigkeit/digitale-schweiz/sicherheit/bug-bounty/files/cve-2018-15476ff.txt", "tags": ["Third Party Advisory"], "source": "cve@mitre.org"}, {"url": "https://www.swisscom.ch/content/dam/swisscom/de/about/nachhaltigkeit/digitale-schweiz/sicherheit/bug-bounty/files/cve-2018-15476ff.txt", "tags": ["Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-295"}]}], "descriptions": [{"lang": "en", "value": "An issue was discovered in myStrom WiFi Switch V1 before 2.66, WiFi Switch V2 before 3.80, WiFi Switch EU before 3.80, WiFi Bulb before 2.58, WiFi LED Strip before 3.80, WiFi Button before 2.73, and WiFi Button Plus before 2.73. The SSL/TLS server certificate in the device to cloud communication was not verified by the device. As a result, an attacker in control of the network traffic of a device could have taken control of a device by intercepting and modifying commands issued from the server to the device in a Man-in-the-Middle attack. This included the ability to inject firmware update commands into the communication and cause the device to install maliciously modified firmware."}, {"lang": "es", "value": "Se ha descubierto un problema en WiFi Switch V1 en versiones anteriores a la 2.66, WiFi Switch V2 en versiones anteriores a la 3.80, WiFi Switch EU en versiones anteriores a la 3.80, WiFi Bulb en versiones anteriores a la 2.58, WiFi LED Strip en versiones anteriores a la 3.80, WiFi Button en versiones anteriores a la 2.73 y WiFi Button Plus en versiones anteriores a la 2.73, de myStrom. El certificado del servidor SSL/TLS en el dispositivo para la comunicaci\u00f3n cloud no fue verificado por el dispositivo. Como resultado, un atacante que controle el tr\u00e1fico de red de un dispositivo podr\u00eda haber obtenido el control de un dispositivo interceptando y modificando comandos lanzados desde el servidor al dispositivo en un atacante Man-in-the-Middle (MitM). Esto inclu\u00eda la capacidad de inyectar comandos de actualizaci\u00f3n de firmware en la comunicaci\u00f3n y provocar que el dispositivo instale firmware maliciosamente modificado."}], "lastModified": "2024-11-21T03:50:53.547", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:mystrom:wifi_switch_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "70FCB4DD-851D-4BC3-A21C-1FCD0EF98C96", "versionEndExcluding": "2.66"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:mystrom:wifi_switch:v1:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "BAA509BE-58A0-42ED-9443-315A476E56C8"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:mystrom:wifi_switch_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7C5F5BB2-A2D2-4AB7-989C-3A57FAE80680", "versionEndExcluding": "3.80"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:mystrom:wifi_switch:v2:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "AD1FDF37-FB91-4785-9E7B-18E998588CCC"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:mystrom:wifi_button_plus_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "96731591-1B70-4959-A6FC-8E77825ED201", "versionEndExcluding": "2.73"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:mystrom:wifi_button_plus:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "E19B7F6F-B18D-4DDA-9F9B-53E4930214A1"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:mystrom:wifi_button_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EF02CFF8-3F22-439B-A577-23A89B78CDC5", "versionEndExcluding": "2.73"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:mystrom:wifi_button:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "6FD827E0-F663-42D3-A4A4-6FE25A456D1F"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:mystrom:wifi_switch_eu_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "78EE8AA5-3DF6-4675-BC6D-AA04178AF4E9", "versionEndExcluding": "3.80"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:mystrom:wifi_switch_eu:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "021F3B3F-C2DD-489B-B11C-F5DDD91F80DB"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:mystrom:wifi_bulb_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "80C4BEFA-1421-4277-BBD3-7D14C2A9094B", "versionEndExcluding": "2.58"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:mystrom:wifi_bulb:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "48FA62DC-223A-4076-AA70-6607595225E4"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:mystrom:wifi_led_strip_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2A75310A-A268-4A10-A9E9-7C1EC40F4B0A", "versionEndExcluding": "3.80"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:mystrom:wifi_led_strip:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "FEF13066-B15B-4C40-BCF3-06F60D3EC95C"}], "operator": "OR"}], "operator": "AND"}], "sourceIdentifier": "cve@mitre.org"}