First published: Tue Aug 06 2019(Updated: )
eQ-3 Homematic CCU2 and CCU3 use session IDs for authentication but lack authorization checks. Consequently, a valid guest level or user level account can create a new admin level account, read the service messages, clear the system protocol or modify/delete internal programs, etc. pp.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Eq-3 Ccu2 Firmware | <=2.47.15 | |
Eq-3 Ccu2 | ||
Eq-3 Ccu3 Firmware | <=3.47.15 | |
Eq-3 Ccu3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-14473 is a vulnerability found in eQ-3 Homematic CCU2 and CCU3 devices that allows unauthorized users to create admin level accounts, read service messages, clear system protocols, and modify/delete internal programs.
CVE-2019-14473 has a severity value of 8.8 (high).
CVE-2019-14473 affects eQ-3 Homematic CCU2 firmware versions up to 2.47.15 and eQ-3 Homematic CCU3 firmware versions up to 3.47.15.
CVE-2019-14473 can be exploited by an attacker with a valid guest level or user level account to perform unauthorized actions.
No, Eq-3 Ccu2 devices are not vulnerable to CVE-2019-14473.