ID

VAR-201808-0083


CVE

CVE-2017-14452


TITLE

Insteon Hub Firmware buffer error vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2017-014244

DESCRIPTION

An exploitable buffer overflow vulnerability exists in the PubNub message handler for the "control" channel of Insteon Hub running firmware version 1012. Specially crafted replies received from the PubNub service can cause buffer overflows on a global section overwriting arbitrary data. A strcpy overflows the buffer insteon_pubnub.channel_cc_r, which has a size of 16 bytes. An attacker can send an arbitrarily long "c_r" parameter in order to exploit this vulnerability. An attacker should impersonate PubNub and answer an HTTPS GET request to trigger this vulnerability. Insteon Hub The firmware contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Insteon Hub is an Insteon central controller product of Insteon Company in the United States. This product can remotely control light bulbs, wall switches, air conditioners, etc. in your home

Trust: 1.71

sources: NVD: CVE-2017-14452 // JVNDB: JVNDB-2017-014244 // VULHUB: VHN-105176

IOT TAXONOMY

category:['home & office device']sub_category:smart home device

Trust: 0.1

category:['home & office device']sub_category:smart home controller

Trust: 0.1

sources: OTHER: None

AFFECTED PRODUCTS

vendor:insteonmodel:hubscope:eqversion:1012

Trust: 2.4

sources: JVNDB: JVNDB-2017-014244 // CNNVD: CNNVD-201709-616 // NVD: CVE-2017-14452

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2017-14452
value: HIGH

Trust: 1.0

talos-cna@cisco.com: CVE-2017-14452
value: HIGH

Trust: 1.0

NVD: CVE-2017-14452
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201709-616
value: HIGH

Trust: 0.6

VULHUB: VHN-105176
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2017-14452
severity: MEDIUM
baseScore: 6.5
vectorString: AV:N/AC:L/AU:S/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-105176
severity: MEDIUM
baseScore: 6.5
vectorString: AV:N/AC:L/AU:S/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2017-14452
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.0

Trust: 1.8

talos-cna@cisco.com: CVE-2017-14452
baseSeverity: HIGH
baseScore: 8.5
vectorString: CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: HIGH
privilegesRequired: LOW
userInteraction: NONE
scope: CHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 6.0
version: 3.0

Trust: 1.0

sources: VULHUB: VHN-105176 // JVNDB: JVNDB-2017-014244 // CNNVD: CNNVD-201709-616 // NVD: CVE-2017-14452 // NVD: CVE-2017-14452

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.9

sources: VULHUB: VHN-105176 // JVNDB: JVNDB-2017-014244 // NVD: CVE-2017-14452

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201709-616

TYPE

buffer error

Trust: 0.6

sources: CNNVD: CNNVD-201709-616

CONFIGURATIONS

sources: JVNDB: JVNDB-2017-014244

PATCH

title:Insteon Huburl:https://www.insteon.com/insteon-hub/

Trust: 0.8

sources: JVNDB: JVNDB-2017-014244

EXTERNAL IDS

db:NVDid:CVE-2017-14452

Trust: 2.6

db:TALOSid:TALOS-2017-0502

Trust: 2.5

db:JVNDBid:JVNDB-2017-014244

Trust: 0.8

db:CNNVDid:CNNVD-201709-616

Trust: 0.7

db:OTHERid:NONE

Trust: 0.1

db:VULHUBid:VHN-105176

Trust: 0.1

sources: OTHER: None // VULHUB: VHN-105176 // JVNDB: JVNDB-2017-014244 // CNNVD: CNNVD-201709-616 // NVD: CVE-2017-14452

REFERENCES

url:https://www.talosintelligence.com/vulnerability_reports/talos-2017-0502

Trust: 1.9

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-14452

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2017-14452

Trust: 0.8

url:https://talosintelligence.com/vulnerability_reports/talos-2017-0502

Trust: 0.6

url:https://ieeexplore.ieee.org/abstract/document/10769424

Trust: 0.1

sources: OTHER: None // VULHUB: VHN-105176 // JVNDB: JVNDB-2017-014244 // CNNVD: CNNVD-201709-616 // NVD: CVE-2017-14452

SOURCES

db:OTHERid: -
db:VULHUBid:VHN-105176
db:JVNDBid:JVNDB-2017-014244
db:CNNVDid:CNNVD-201709-616
db:NVDid:CVE-2017-14452

LAST UPDATE DATE

2025-01-30T20:55:25.510000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-105176date:2018-11-02T00:00:00
db:JVNDBid:JVNDB-2017-014244date:2018-11-28T00:00:00
db:CNNVDid:CNNVD-201709-616date:2022-04-20T00:00:00
db:NVDid:CVE-2017-14452date:2024-11-21T03:12:49.447

SOURCES RELEASE DATE

db:VULHUBid:VHN-105176date:2018-08-23T00:00:00
db:JVNDBid:JVNDB-2017-014244date:2018-11-28T00:00:00
db:CNNVDid:CNNVD-201709-616date:2017-09-15T00:00:00
db:NVDid:CVE-2017-14452date:2018-08-23T18:29:00.280