First published: Thu Jun 04 2020(Updated: )
An issue was discovered in all Athom Homey and Homey Pro devices up to the current version 4.2.0. An attacker within RF range can obtain a cleartext copy of the network configuration of the device, including the Wi-Fi PSK, during device setup. Upon success, the attacker is able to further infiltrate the target's Wi-Fi networks.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Homey | <4.2.0 | |
Homey Homey Pro | ||
Homey | <4.2.0 | |
Homey |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-9462 is classified as a high severity vulnerability due to its potential to expose sensitive network configuration information.
To mitigate CVE-2020-9462, upgrade your Homey or Homey Pro devices to the latest firmware version beyond 4.2.0.
CVE-2020-9462 affects all Athom Homey and Homey Pro devices running firmware version 4.2.0 or older.
CVE-2020-9462 allows an attacker within RF range to capture the device's cleartext network configuration, including the Wi-Fi PSK.
CVE-2020-9462 was discovered in 2020, affecting devices up to firmware version 4.2.0.