First published: Wed Dec 22 2021(Updated: )
An authentication bypass vulnerability exists in the process_msg() function of the home_security binary of Anker Eufy Homebase 2 2.1.6.9h. A specially-crafted man-in-the-middle attack can lead to increased privileges.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Anker Eufy Homebase 2 Firmware | =2.1.6.9h | |
Anker Eufy Homebase 2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-21953 is considered to have a high severity due to the potential for authentication bypass and increased privileges.
To fix CVE-2021-21953, users should update the Anker Eufy Homebase 2 to the latest firmware version that addresses this vulnerability.
CVE-2021-21953 is associated with a man-in-the-middle attack that can exploit the vulnerability to gain unauthorized access.
CVE-2021-21953 affects the Anker Eufy Homebase 2 firmware version 2.1.6.9h.
The potential impacts of CVE-2021-21953 include unauthorized access and control over the Anker Eufy Homebase 2 system.