First published: Wed Mar 04 2020(Updated: )
Rubetek SmartHome 2020 devices use unencrypted 433 MHz communication between controllers and beacons, allowing an attacker to sniff and spoof beacon requests remotely.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Rubetek Smarthome Firmware | =2020 | |
mi SmartHome |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-9550 is classified as a high severity vulnerability due to its potential for remote exploitation.
To mitigate CVE-2020-9550, upgrade to the latest Rubetek firmware that addresses the unencrypted 433 MHz communication.
CVE-2020-9550 affects Rubetek SmartHome devices using the 2020 firmware version.
CVE-2020-9550 can be exploited by attackers to sniff and spoof communications between controllers and beacons.
The primary vulnerability in CVE-2020-9550 is the use of unencrypted communication over 433 MHz.