Description
eQ-3 Homematic CCU2 and CCU3 use session IDs for authentication but lack authorization checks. Consequently, a valid guest level or user level account can create a new admin level account, read the service messages, clear the system protocol or modify/delete internal programs, etc. pp.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2019-5658 | eQ-3 Homematic CCU2 and CCU3 use session IDs for authentication but lack authorization checks. Consequently, a valid guest level or user level account can create a new admin level account, read the service messages, clear the system protocol or modify/delete internal programs, etc. pp. |
References
| Link | Providers |
|---|---|
| https://psytester.github.io/CVE-2019-14473 |
|
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T00:19:41.317Z
Reserved: 2019-08-01T00:00:00.000Z
Link: CVE-2019-14473
No data.
Status : Modified
Published: 2019-08-06T19:15:13.410
Modified: 2024-11-21T04:26:49.157
Link: CVE-2019-14473
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD