PT-2023-10597 · Unknown · Insteon Hub

Published

2023-01-11

·

Updated

2023-01-20

·

CVE-2017-16321

CVSS v3.1
8.5
VectorAV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H

Name of the Vulnerable Software and Affected Versions:

Insteon Hub version 1012

Description:

Multiple exploitable buffer overflow vulnerabilities exist in the PubNub message handler for the "cc" channel of Insteon Hub. Specially crafted commands sent through the PubNub service can cause a stack-based buffer overflow overwriting arbitrary data. An attacker should send an authenticated HTTP request to trigger this vulnerability. In cmd `s sonos`, at `0x9d01e050`, the value for the `s sonos index` key is copied using `strcpy` to the buffer at `$sp+0x1b4`. This buffer is 8 bytes large, sending anything longer will cause a buffer overflow.

Recommendations:

As a temporary workaround, consider disabling the `s sonos` command until a patch is available. Restrict access to the PubNub message handler for the "cc" channel to minimize the risk of exploitation. Avoid sending authenticated HTTP requests with specially crafted commands to the Insteon Hub until the issue is resolved. At the moment, there is no information about a newer version that contains a fix for this vulnerability.

Stack Overflow

Weakness Enumeration

Related Identifiers

CVE-2017-16321

Affected Products

Insteon Hub