belkin wemo_home_automation_firmware Security Vulnerabilities

5 Vulnerabilities
Description

The Belkin WeMo Home Automation firmware before 3949 has a hardcoded GPG key, which makes it easier for remote attackers to spoof firmware updates and execute arbitrary code via crafted signed data.

Impacted versions: 2769

Base Score: 10.0, Severity: HIGH, ID: CVE-2013-6952, Last Modified: 2014-03-06T04:49:00Z

References

US Government Resource

The Belkin WeMo Home Automation firmware before 3949 does not use SSL for the distribution feed, which allows man-in-the-middle attackers to install arbitrary firmware by spoofing a distribution server.

Impacted versions: 2769

Base Score: 7.8, Severity: HIGH, ID: CVE-2013-6950, Last Modified: 2014-03-06T04:49:00Z

References

US Government Resource

The peerAddresses API in the Belkin WeMo Home Automation firmware before 3949 allows remote attackers to read arbitrary files via an XML document containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.

Impacted versions: 2769

Base Score: 7.8, Severity: HIGH, ID: CVE-2013-6948, Last Modified: 2014-03-06T04:49:00Z

References

US Government Resource

The Belkin WeMo Home Automation firmware before 3949 does not properly use the STUN and TURN protocols, which allows remote attackers to hijack connections and possibly have unspecified other impact by leveraging access to a single WeMo device.

Impacted versions: 2769

Base Score: 9.3, Severity: HIGH, ID: CVE-2013-6949, Last Modified: 2014-03-06T04:49:00Z

References

US Government Resource

The Belkin WeMo Home Automation firmware before 3949 does not maintain a set of Certification Authority public keys, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary X.509 certificate.

Impacted versions: 2769

Base Score: 7.1, Severity: HIGH, ID: CVE-2013-6951, Last Modified: 2014-02-24T17:19:00Z

References

US Government Resource
Free Home-Networking Courses, tutorials and security checklists

USAGE: Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.