First published: Mon Aug 27 2018(Updated: )
An exploitable vulnerability exists in the remote servers of Samsung SmartThings Hub STH-ETH-250 - Firmware version 0.20.17. The hubCore process listens on port 39500 and relays any unauthenticated messages to SmartThings' remote servers, which incorrectly handle camera IDs for the 'sync' operation, leading to arbitrary deletion of cameras. An attacker can send an HTTP request to trigger this vulnerability.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Samsung STH-ETH-250 | =0.20.17 | |
Samsung STH-ETH-250 Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-3918 is a critical severity vulnerability that can allow unauthorized access to sensitive data.
To fix CVE-2018-3918, update the Samsung SmartThings Hub to the latest firmware version that patches this vulnerability.
CVE-2018-3918 can be exploited for unauthorized message relay to SmartThings' remote servers, potentially compromising user privacy.
CVE-2018-3918 affects the Samsung SmartThings Hub STH-ETH-250 with firmware version 0.20.17.
Yes, CVE-2018-3918 is remotely exploitable due to its presence in the hubCore process listening on a public-facing port.