First published: Tue Aug 20 2019(Updated: )
An exploitable information disclosure vulnerability exists in the Weave PASE pairing functionality of the Nest Cam IQ Indoor, version 4620002. A set of specially crafted weave packets can brute force a pairing code, resulting in greater Weave access and potentially full device control. An attacker can send specially crafted packets to trigger this vulnerability.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Google Nest Cam IQ | =4620002 | |
Google Nest |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-5035 has a high severity rating due to the potential for remote exploitation that could allow an attacker to gain full device control.
To mitigate CVE-2019-5035, you should update the Google Nest Cam IQ Indoor firmware to the latest version provided by Google.
CVE-2019-5035 is an information disclosure vulnerability that affects the Weave PASE pairing functionality.
CVE-2019-5035 specifically affects the Google Nest Cam IQ Indoor firmware version 4620002.
Yes, CVE-2019-5035 can be exploited remotely using specially crafted Weave packets to brute force a pairing code.