First published: Fri Aug 24 2018(Updated: )
An exploitable vulnerability exists in the REST parser of video-core's HTTP server of the Samsung SmartThings Hub STH-ETH-250 - Firmware version 0.20.17. The video-core process incorrectly handles pipelined HTTP requests, which allows successive requests to overwrite the previously parsed HTTP method, 'onmessagecomplete' callback. An attacker can send an HTTP request to trigger this vulnerability.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Samsung Sth-eth-250 Firmware | =0.20.17 | |
Samsung Sth-eth-250 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-3909 is rated as high severity due to the risk of exploitation through HTTP request manipulation.
To fix CVE-2018-3909, update the Samsung SmartThings Hub to a firmware version higher than 0.20.17.
CVE-2018-3909 affects the Samsung SmartThings Hub model STH-ETH-250 running firmware version 0.20.17.
CVE-2018-3909 is a REST parser vulnerability in the video-core HTTP server that can lead to improper request handling.
Yes, CVE-2018-3909 can be exploited remotely through crafted HTTP requests sent to the vulnerable SmartThings Hub.