Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:mystrom:wifi_switch_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "70FCB4DD-851D-4BC3-A21C-1FCD0EF98C96", "versionEndExcluding": "2.66", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:mystrom:wifi_switch:v1:*:*:*:*:*:*:*", "matchCriteriaId": "BAA509BE-58A0-42ED-9443-315A476E56C8", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:mystrom:wifi_switch_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7C5F5BB2-A2D2-4AB7-989C-3A57FAE80680", "versionEndExcluding": "3.80", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:mystrom:wifi_switch:v2:*:*:*:*:*:*:*", "matchCriteriaId": "AD1FDF37-FB91-4785-9E7B-18E998588CCC", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:mystrom:wifi_button_plus_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "96731591-1B70-4959-A6FC-8E77825ED201", "versionEndExcluding": "2.73", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:mystrom:wifi_button_plus:-:*:*:*:*:*:*:*", "matchCriteriaId": "E19B7F6F-B18D-4DDA-9F9B-53E4930214A1", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:mystrom:wifi_button_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EF02CFF8-3F22-439B-A577-23A89B78CDC5", "versionEndExcluding": "2.73", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:mystrom:wifi_button:-:*:*:*:*:*:*:*", "matchCriteriaId": "6FD827E0-F663-42D3-A4A4-6FE25A456D1F", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:mystrom:wifi_switch_eu_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "78EE8AA5-3DF6-4675-BC6D-AA04178AF4E9", "versionEndExcluding": "3.80", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:mystrom:wifi_switch_eu:-:*:*:*:*:*:*:*", "matchCriteriaId": "021F3B3F-C2DD-489B-B11C-F5DDD91F80DB", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:mystrom:wifi_bulb_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "80C4BEFA-1421-4277-BBD3-7D14C2A9094B", "versionEndExcluding": "2.58", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:mystrom:wifi_bulb:-:*:*:*:*:*:*:*", "matchCriteriaId": "48FA62DC-223A-4076-AA70-6607595225E4", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:mystrom:wifi_led_strip_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2A75310A-A268-4A10-A9E9-7C1EC40F4B0A", "versionEndExcluding": "3.80", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:mystrom:wifi_led_strip:-:*:*:*:*:*:*:*", "matchCriteriaId": "FEF13066-B15B-4C40-BCF3-06F60D3EC95C", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}], "descriptions": [{"lang": "en", "value": "An issue was discovered in myStrom WiFi Switch V1 before 2.66, WiFi Switch V2 before 3.80, WiFi Switch EU before 3.80, WiFi Bulb before 2.58, WiFi LED Strip before 3.80, WiFi Button before 2.73, and WiFi Button Plus before 2.73. The process of registering a device with a cloud account was based on an activation code derived from the device MAC address. By guessing valid MAC addresses or using MAC addresses printed on devices in shops and reverse engineering the protocol, an attacker would have been able to register previously unregistered devices to their account. When the rightful owner would have connected them after purchase to their WiFi network, the devices would not have registered with their account, would subsequently not have been controllable from the owner's mobile app, and would not have been visible in the owner's account. Instead, they would have been under control of the attacker."}, {"lang": "es", "value": "Se ha descubierto un problema en WiFi Switch V1 en versiones anteriores a la 2.66, WiFi Switch V2 en versiones anteriores a la 3.80, WiFi Switch EU en versiones anteriores a la 3.80, WiFi Bulb en versiones anteriores a la 2.58, WiFi LED Strip en versiones anteriores a la 3.80, WiFi Button en versiones anteriores a la 2.73 y WiFi Button Plus en versiones anteriores a la 2.73, de myStrom. El proceso de registro de un dispositivo con una cuenta en la nube se basaba en un c\u00f3digo de activaci\u00f3n derivado de la direcci\u00f3n MAC del dispositivo. Mediante la adivinaci\u00f3n de direcciones MAC v\u00e1lidas o el uso de direcciones MAC impresas en dispositivos en tiendas y la realizaci\u00f3n de ingenier\u00eda inversa sobre el protocolo, un atacante podr\u00eda haber sido capaz de registrar dispositivos anteriormente no registrados en su cuenta. Cuando su propietario leg\u00edtimo los conectase tras comprarlos a su red Wi-Fi, los dispositivos no se registrar\u00edan con su cuenta, por lo que no ser\u00edan controlables desde la aplicaci\u00f3n m\u00f3vil del due\u00f1o y, adem\u00e1s, no ser\u00edan visibles en la cuenta del due\u00f1o. En su lugar, estar\u00edan bajo el control del atacante."}], "id": "CVE-2018-15478", "lastModified": "2024-11-21T03:50:53.880", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0"}, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}], "cvssMetricV30": [{"cvssData": {"attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0"}, "exploitabilityScore": 2.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2018-08-30T17:29:01.363", "references": [{"source": "cve@mitre.org", "tags": ["Third Party Advisory"], "url": "https://www.swisscom.ch/content/dam/swisscom/de/about/nachhaltigkeit/digitale-schweiz/sicherheit/bug-bounty/files/cve-2018-15476ff.txt"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory"], "url": "https://www.swisscom.ch/content/dam/swisscom/de/about/nachhaltigkeit/digitale-schweiz/sicherheit/bug-bounty/files/cve-2018-15476ff.txt"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-287"}], "source": "nvd@nist.gov", "type": "Primary"}]}