Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:mystrom:wifi_switch_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "70FCB4DD-851D-4BC3-A21C-1FCD0EF98C96", "versionEndExcluding": "2.66", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:mystrom:wifi_switch:v1:*:*:*:*:*:*:*", "matchCriteriaId": "BAA509BE-58A0-42ED-9443-315A476E56C8", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:mystrom:wifi_switch_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7C5F5BB2-A2D2-4AB7-989C-3A57FAE80680", "versionEndExcluding": "3.80", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:mystrom:wifi_switch:v2:*:*:*:*:*:*:*", "matchCriteriaId": "AD1FDF37-FB91-4785-9E7B-18E998588CCC", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:mystrom:wifi_button_plus_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "96731591-1B70-4959-A6FC-8E77825ED201", "versionEndExcluding": "2.73", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:mystrom:wifi_button_plus:-:*:*:*:*:*:*:*", "matchCriteriaId": "E19B7F6F-B18D-4DDA-9F9B-53E4930214A1", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:mystrom:wifi_button_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EF02CFF8-3F22-439B-A577-23A89B78CDC5", "versionEndExcluding": "2.73", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:mystrom:wifi_button:-:*:*:*:*:*:*:*", "matchCriteriaId": "6FD827E0-F663-42D3-A4A4-6FE25A456D1F", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:mystrom:wifi_switch_eu_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "78EE8AA5-3DF6-4675-BC6D-AA04178AF4E9", "versionEndExcluding": "3.80", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:mystrom:wifi_switch_eu:-:*:*:*:*:*:*:*", "matchCriteriaId": "021F3B3F-C2DD-489B-B11C-F5DDD91F80DB", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:mystrom:wifi_bulb_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "80C4BEFA-1421-4277-BBD3-7D14C2A9094B", "versionEndExcluding": "2.58", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:mystrom:wifi_bulb:-:*:*:*:*:*:*:*", "matchCriteriaId": "48FA62DC-223A-4076-AA70-6607595225E4", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:mystrom:wifi_led_strip_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2A75310A-A268-4A10-A9E9-7C1EC40F4B0A", "versionEndExcluding": "3.80", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:mystrom:wifi_led_strip:-:*:*:*:*:*:*:*", "matchCriteriaId": "FEF13066-B15B-4C40-BCF3-06F60D3EC95C", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}], "descriptions": [{"lang": "en", "value": "An issue was discovered in myStrom WiFi Switch V1 before 2.66, WiFi Switch V2 before 3.80, WiFi Switch EU before 3.80, WiFi Bulb before 2.58, WiFi LED Strip before 3.80, WiFi Button before 2.73, and WiFi Button Plus before 2.73. The cloud API had a hidden parameter, which allowed an authenticated user to reconfigure the server URL for a device registered to their account. In combination with an insecure device registration vulnerability, this allowed an attacker to reconfigure a maliciously registered device to their own rogue replica of the myStrom API and issue commands to the device, including firmware update commands."}, {"lang": "es", "value": "Se ha descubierto un problema en WiFi Switch V1 en versiones anteriores a la 2.66, WiFi Switch V2 en versiones anteriores a la 3.80, WiFi Switch EU en versiones anteriores a la 3.80, WiFi Bulb en versiones anteriores a la 2.58, WiFi LED Strip en versiones anteriores a la 3.80, WiFi Button en versiones anteriores a la 2.73 y WiFi Button Plus en versiones anteriores a la 2.73, de myStrom. La API cloud ten\u00eda un par\u00e1metro oculto, lo que permit\u00eda que un usuario autenticado reconfigurase la URL del servidor para un dispositivo registrado en su cuenta. En combinaci\u00f3n con una vulnerabilidad de registro inseguro de dispositivos, esto permit\u00eda que un atacante reconfigurase un dispositivo registrado de forma maliciosa en su propia r\u00e9plica corrupta de la API de myStrom y lanzase comandos al dispositivo, incluyendo los comandos de actualizaci\u00f3n de firmware."}], "id": "CVE-2018-15480", "lastModified": "2024-11-21T03:50:54.217", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0"}, "exploitabilityScore": 8.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}], "cvssMetricV30": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0"}, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2018-08-30T17:29:01.613", "references": [{"source": "cve@mitre.org", "tags": ["Third Party Advisory"], "url": "https://www.swisscom.ch/content/dam/swisscom/de/about/nachhaltigkeit/digitale-schweiz/sicherheit/bug-bounty/files/cve-2018-15476ff.txt"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory"], "url": "https://www.swisscom.ch/content/dam/swisscom/de/about/nachhaltigkeit/digitale-schweiz/sicherheit/bug-bounty/files/cve-2018-15476ff.txt"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "NVD-CWE-noinfo"}], "source": "nvd@nist.gov", "type": "Primary"}]}