Full Disclosure mailing list archives
[CVE-2017-7726] - Missing SSL Certificate Validation in iSmartAlarm
From: Ilia Shnaidman <Ilia.Shnaidman () bullguard com>
Date: Wed, 12 Jul 2017 15:55:38 +0000
[+] Credits: Ilia Shnaidman [+] Source: http://dojo.bullguard.com/blog/burglar-hacker-when-a-physical-security-is-compromised-by-iot-vulnerabilities/ Vendor: ============= iSmartAlarm, inc. Product: =========================== iSmartAlarm cube - All versions iSmartAlarm is one of the leading IoT manufactures in the domain of smart alarm systems. It provides a fully integrated alarm system with siren, smart cameras and locks. It functions like any alarm system, but with the benefits of a connected device: alerts pop up on your phone, offering you full remote control via mobile app wherever you are. Vulnerability Type: ====================== Missing SSL Certificate Validation CVE Reference: ============== CVE-2017-7726 Security Issue: ================ iSmartAlarm's cube communicates with iSmartAlarm's backend using SSL encryption on port tcp/8443. But the cube does not validate server certificate. Attack Vectors: ================ An attacker can get any password/personal data by setting man in the middle sniffer attack with a fake certificate on port 8443. Network Access: =============== Remote Severity: ========= High Disclosure Timeline: ===================================== Jan 30, 2017: Initial contact to vendor Feb 1, 2017: Vendor replied, requesting details Feb 2, 2017: Disclosure to vendor Apr 12, 2017: After vendor didn't replied, I've approached CERT Apr 13, 2017: Confirmed receipt by CERT and assigning CVEs July 05, 2017: Public disclosure _______________________________________________ Sent through the Full Disclosure mailing list https://nmap.org/mailman/listinfo/fulldisclosure Web Archives & RSS: http://seclists.org/fulldisclosure/
Current thread:
- [CVE-2017-7726] - Missing SSL Certificate Validation in iSmartAlarm Ilia Shnaidman (Jul 12)