First published: Thu Aug 23 2018(Updated: )
An exploitable firmware downgrade vulnerability exists in Insteon Hub running firmware version 1013. The firmware upgrade functionality, triggered via PubNub, retrieves signed firmware binaries using plain HTTP requests. The device doesn't check the firmware version that is going to be installed and thus allows for flashing older firmware images. To trigger this vulnerability, an attacker needs to impersonate the remote server 'cache.insteon.com' and serve any signed firmware image.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Insteon Hub Firmware | =1013 | |
Insteon Hub |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-3833 is considered a high severity vulnerability due to its potential for firmware downgrade attacks.
To mitigate CVE-2018-3833, ensure that the Insteon Hub firmware is updated to a version beyond 1013 that includes security enhancements.
CVE-2018-3833 specifically affects the Insteon Hub 2245-222 running firmware version 1013.
The main issue with CVE-2018-3833 is that it allows firmware downgrades due to the lack of version checks during firmware upgrades.
Yes, CVE-2018-3833 can potentially be exploited remotely via an insecure HTTP request used during the firmware upgrade process.