First published: Wed Jan 13 2021(Updated: )
Loxone Miniserver devices with firmware before 11.1 (aka 11.1.9.3) are unable to use an authentication method that is based on the "signature of the update package." Therefore, these devices (or attackers who are spoofing these devices) can continue to use an unauthenticated cloud service for an indeterminate time period (possibly forever). Once an individual device's firmware is updated, and authentication occurs once, the cloud service recategorizes the device so that authentication is subsequently always required, and spoofing cannot occur.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Loxone Miniserver Gen 1 | <11.1.9.3 | |
Loxone Miniserver |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-27488 is classified as a high severity vulnerability due to its potential to allow unauthorized access to cloud services.
To fix CVE-2020-27488, update the firmware of the Loxone Miniserver devices to version 11.1.9.3 or later.
CVE-2020-27488 affects Loxone Miniserver devices running firmware versions earlier than 11.1.9.3.
The impact of CVE-2020-27488 is that it allows attackers to spoof devices and potentially access unauthenticated cloud services.
CVE-2020-27488 is an authentication vulnerability that arises from insufficient signature verification in Loxone Miniserver firmware.