Vulnerability identifier: #VU14099
Vulnerability risk: Low
CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID:
CWE-ID:
CWE-20
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
SmartThings Hub STH-ETH-250
Hardware solutions /
Firmware
Vendor: Samsung
Description
hubCore
process listens on port 39500 and relays any unauthenticated messages to SmartThings' remote servers. A remote attacker can send an HTTP request, trigger incorrect handling of camera IDs for the "sync" operation, delete arbitrary cameras and cause the service to crash.
Mitigation
Install update from vendor's website.
Vulnerable software versions
SmartThings Hub STH-ETH-250: 0.20.17
External links
http://www.talosintelligence.com/reports/TALOS-2018-0582/
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.