First published: Thu Jul 26 2018(Updated: )
An exploitable information disclosure vulnerability exists in the crash handler of the hubCore binary of the Samsung SmartThings Hub STH-ETH-250 - Firmware version 0.20.17. When hubCore crashes, Google Breakpad is used to record minidumps, which are sent over an insecure HTTPS connection to the backtrace.io service, leading to the exposure of sensitive data. An attacker can impersonate the remote backtrace.io server in order to trigger this vulnerability.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Samsung STH-ETH-250 | =0.20.17 | |
Samsung STH-ETH-250 Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-3927 is categorized as an information disclosure vulnerability.
There are no official patches available for CVE-2018-3927; consider upgrading to a more secure firmware version if available.
CVE-2018-3927 affects the Samsung SmartThings Hub STH-ETH-250 running firmware version 0.20.17.
An attacker can exploit CVE-2018-3927 to gain access to sensitive information through minidumps sent over an insecure connection.
CVE-2018-3927 was disclosed in 2018.