Description
Rubetek SmartHome 2020 devices use unencrypted 433 MHz communication between controllers and beacons, allowing an attacker to sniff and spoof beacon requests remotely.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-30352 | Rubetek SmartHome 2020 devices use unencrypted 433 MHz communication between controllers and beacons, allowing an attacker to sniff and spoof beacon requests remotely. |
References
| Link | Providers |
|---|---|
| https://pastebin.com/CckKKJcM |
|
| https://rubetek.com/ |
|
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T10:34:39.443Z
Reserved: 2020-03-02T00:00:00.000Z
Link: CVE-2020-9550
No data.
Status : Modified
Published: 2020-03-04T19:15:14.150
Modified: 2024-11-21T05:40:51.063
Link: CVE-2020-9550
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD