CVE-2018-15478
CVSS V2 Medium 6.8
CVSS V3 High 8.1
Description
An issue was discovered in myStrom WiFi Switch V1 before 2.66, WiFi Switch V2 before 3.80, WiFi Switch EU before 3.80, WiFi Bulb before 2.58, WiFi LED Strip before 3.80, WiFi Button before 2.73, and WiFi Button Plus before 2.73. The process of registering a device with a cloud account was based on an activation code derived from the device MAC address. By guessing valid MAC addresses or using MAC addresses printed on devices in shops and reverse engineering the protocol, an attacker would have been able to register previously unregistered devices to their account. When the rightful owner would have connected them after purchase to their WiFi network, the devices would not have registered with their account, would subsequently not have been controllable from the owner's mobile app, and would not have been visible in the owner's account. Instead, they would have been under control of the attacker.
Overview
- CVE ID
- CVE-2018-15478
- Assigner
- cve@mitre.org
- Vulnerability Status
- Analyzed
- Published Version
- 2018-08-30T17:29:01
- Last Modified Date
- 2019-10-03T00:03:26
Weakness Enumerations
CPE Configuration (Product)
CPE | Vulnerable | Operator | Version Start | Version End |
---|---|---|---|---|
AND | ||||
cpe:2.3:o:mystrom:wifi_switch_firmware:*:*:*:*:*:*:*:* | 1 | OR | 2.66 | |
cpe:2.3:h:mystrom:wifi_switch:v1:*:*:*:*:*:*:* | 0 | OR | ||
AND | ||||
cpe:2.3:o:mystrom:wifi_switch_firmware:*:*:*:*:*:*:*:* | 1 | OR | 3.80 | |
cpe:2.3:h:mystrom:wifi_switch:v2:*:*:*:*:*:*:* | 0 | OR | ||
AND | ||||
cpe:2.3:o:mystrom:wifi_button_plus_firmware:*:*:*:*:*:*:*:* | 1 | OR | 2.73 | |
cpe:2.3:h:mystrom:wifi_button_plus:-:*:*:*:*:*:*:* | 0 | OR | ||
AND | ||||
cpe:2.3:o:mystrom:wifi_button_firmware:*:*:*:*:*:*:*:* | 1 | OR | 2.73 | |
cpe:2.3:h:mystrom:wifi_button:-:*:*:*:*:*:*:* | 0 | OR | ||
AND | ||||
cpe:2.3:o:mystrom:wifi_switch_eu_firmware:*:*:*:*:*:*:*:* | 1 | OR | 3.80 | |
cpe:2.3:h:mystrom:wifi_switch_eu:-:*:*:*:*:*:*:* | 0 | OR | ||
AND | ||||
cpe:2.3:o:mystrom:wifi_bulb_firmware:*:*:*:*:*:*:*:* | 1 | OR | 2.58 | |
cpe:2.3:h:mystrom:wifi_bulb:-:*:*:*:*:*:*:* | 0 | OR | ||
AND | ||||
cpe:2.3:o:mystrom:wifi_led_strip_firmware:*:*:*:*:*:*:*:* | 1 | OR | 3.80 | |
cpe:2.3:h:mystrom:wifi_led_strip:-:*:*:*:*:*:*:* | 0 | OR |
CVSS Version 2
- Version
- 2.0
- Vector String
- AV:N/AC:M/Au:N/C:P/I:P/A:P
- Access Vector
- NETWORK
- Access Compatibility
- MEDIUM
- Authentication
- NONE
- Confidentiality Impact
- PARTIAL
- Integrity Impact
- PARTIAL
- Availability Impact
- PARTIAL
- Base Score
- 6.8
- Severity
- MEDIUM
- Exploitability Score
- 8.6
- Impact Score
- 6.4
CVSS Version 3
- Version
- 3.0
- Vector String
- CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
- Attack Vector
- NETWORK
- Attack Compatibility
- HIGH
- Privileges Required
- NONE
- User Interaction
- NONE
- Scope
- UNCHANGED
- Confidentiality Impact
- HIGH
- Availability Impact
- HIGH
- Base Score
- 8.1
- Base Severity
- HIGH
- Exploitability Score
- 2.2
- Impact Score
- 5.9
References
Reference URL | Reference Tags |
---|---|
https://www.swisscom.ch/content/dam/swisscom/de/about/nachhaltigkeit/digitale-schweiz/sicherheit/bug-bounty/files/cve-2018-15476ff.txt | Third Party Advisory |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2018-15478 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15478 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2022-05-10 17:33:22 | Added to TrackCVE | |||
2022-12-03 11:38:25 | 2018-08-30T17:29Z | 2018-08-30T17:29:01 | CVE Published Date | updated |
2022-12-03 11:38:25 | 2019-10-03T00:03:26 | CVE Modified Date | updated | |
2022-12-03 11:38:25 | Analyzed | Vulnerability Status | updated |