First published: Thu Feb 22 2018(Updated: )
In /usr/local/etc/config/addons/mh/loopupd.sh on eQ-3 AG HomeMatic CCU2 2.29.22 devices, software update packages are downloaded via the HTTP protocol, which does not provide any cryptographic protection of the downloaded contents. An attacker with a privileged network position (which could be obtained via DNS spoofing of www.meine-homematic.de or other approaches) can exploit this issue in order to provide arbitrary malicious firmware updates to the CCU2. This can result in a full system compromise.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Eq-3 Homematic Central Control Unit Ccu2 Firmware | =2.29.22 | |
Eq-3 Homematic Central Control Unit Ccu2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-7298 is a vulnerability found in eQ-3 AG HomeMatic CCU2 version 2.29.22 devices, where software update packages are downloaded over HTTP without cryptographic protection.
CVE-2018-7298 has a severity rating of 8.1, which is considered critical.
CVE-2018-7298 affects eQ-3 AG HomeMatic CCU2 version 2.29.22 devices by allowing an attacker with a privileged network position to intercept and manipulate software update packages.
To fix CVE-2018-7298, it is recommended to update to a version of eQ-3 AG HomeMatic CCU2 that includes cryptographic protection for downloaded software update packages.
No, Eq-3 Homematic Central Control Unit Ccu2 is not vulnerable to CVE-2018-7298.