PT-2023-10597 · Unknown · Insteon Hub
Published
2023-01-11
·
Updated
2023-01-20
·
CVE-2017-16321
CVSS v3.1
8.5
Vector | AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H |
Stack Overflow
Weakness Enumeration
Related Identifiers
Affected Products
Insteon Hub
Published
2023-01-11
·
Updated
2023-01-20
·
CVE-2017-16321
8.5
High
Base vector | Vector | AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions:
Insteon Hub version 1012
Description:
Multiple exploitable buffer overflow vulnerabilities exist in the PubNub message handler for the "cc" channel of Insteon Hub. Specially crafted commands sent through the PubNub service can cause a stack-based buffer overflow overwriting arbitrary data. An attacker should send an authenticated HTTP request to trigger this vulnerability. In cmd `s sonos`, at `0x9d01e050`, the value for the `s sonos index` key is copied using `strcpy` to the buffer at `$sp+0x1b4`. This buffer is 8 bytes large, sending anything longer will cause a buffer overflow.
Recommendations:
As a temporary workaround, consider disabling the `s sonos` command until a patch is available. Restrict access to the PubNub message handler for the "cc" channel to minimize the risk of exploitation. Avoid sending authenticated HTTP requests with specially crafted commands to the Insteon Hub until the issue is resolved. At the moment, there is no information about a newer version that contains a fix for this vulnerability.
Stack Overflow