Rubetek SmartHome 2020 devices use unencrypted 433 MHz communication between controllers and beacons, allowing an attacker to sniff and spoof beacon requests remotely.
References
Link | Resource |
---|---|
https://pastebin.com/CckKKJcM | Third Party Advisory |
https://rubetek.com/ | Vendor Advisory |
https://pastebin.com/CckKKJcM | Third Party Advisory |
https://rubetek.com/ | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 05:40
Type | Values Removed | Values Added |
---|---|---|
References | () https://pastebin.com/CckKKJcM - Third Party Advisory | |
References | () https://rubetek.com/ - Vendor Advisory |
Information
Published : 2020-03-04 19:15
Updated : 2024-11-21 05:40
NVD link : CVE-2020-9550
Mitre link : CVE-2020-9550
CVE.ORG link : CVE-2020-9550
JSON object : View
Products Affected
rubetek
- smarthome_firmware
- smarthome
CWE
CWE-319
Cleartext Transmission of Sensitive Information