First published: Tue Jun 19 2018(Updated: )
An exploitable buffer overflow vulnerability exists in the PubNub message handler for the "control" channel of Insteon Hub running firmware version 1012. Specially crafted replies received from the PubNub service can cause buffer overflows on a global section overwriting arbitrary data. A strcpy overflows the buffer insteon_pubnub.channel_cc_r, which has a size of 16 bytes. An attacker can send an arbitrarily long "c_r" parameter in order to exploit this vulnerability. An attacker should impersonate PubNub and answer an HTTPS GET request to trigger this vulnerability.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Insteon Hub | =1012 | |
Insteon Hub |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-14452 is considered a high severity vulnerability due to its potential for arbitrary data overwriting and buffer overflow exploitation.
To fix CVE-2017-14452, update the Insteon Hub firmware to a version that addresses this buffer overflow vulnerability.
CVE-2017-14452 affects the Insteon Hub running firmware version 1012.
Yes, CVE-2017-14452 can be exploited remotely through specially crafted messages sent to the PubNub message handler.
Exploiting CVE-2017-14452 can lead to a denial of service or the execution of arbitrary code on the affected Insteon Hub.