In Fibaro Home Center 2 and Lite devices in all versions provide a web based management interface over unencrypted HTTP protocol. Communication between the user and the device can be eavesdropped to hijack sessions, tokens and passwords.
The product transmits sensitive or security-critical data in cleartext in a communication channel that can be sniffed by unauthorized actors.
Link | Tags |
---|---|
https://www.iot-inspector.com/blog/advisory-fibaro-home-center/ | third party advisory exploit |
http://seclists.org/fulldisclosure/2021/Apr/27 | third party advisory mailing list |
http://packetstormsecurity.com/files/162243/Fibaro-Home-Center-MITM-Missing-Authentication-Code-Execution.html | exploit vdb entry third party advisory |