PT-2023-10589 · Insteon · Insteon Hub

Published

2023-01-11

·

Updated

2023-01-20

·

CVE-2017-16313

CVSS v3.1
8.5
VectorAV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H

Name of the Vulnerable Software and Affected Versions:

Insteon Hub version 1012

Description:

Multiple exploitable buffer overflow vulnerabilities exist in the PubNub message handler for the "cc" channel of Insteon Hub. Specially crafted commands sent through the PubNub service can cause a stack-based buffer overflow overwriting arbitrary data. An attacker should send an authenticated HTTP request to trigger this vulnerability. In cmd s sonos, at 0x9d01c084, the value for the `s ddelay` key is copied using `strcpy` to the buffer at `$sp+0x2b0`. This buffer is 32 bytes large, sending anything longer will cause a buffer overflow.

Recommendations:

As a temporary workaround, consider restricting access to the PubNub message handler for the "cc" channel until a patch is available.

Avoid sending authenticated HTTP requests to the vulnerable endpoint until the issue is resolved.

Restrict the use of the `s ddelay` key in the cmd s sonos to prevent buffer overflow.

At the moment, there is no information about a newer version that contains a fix for this vulnerability.

Stack Overflow

Weakness Enumeration

Related Identifiers

CVE-2017-16313

Affected Products

Insteon Hub