Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ccu3_firmware vulnerabilities and exploits
(subscribe to this query)
445
VMScore
CVE-2019-14474
eQ-3 Homematic CCU3 3.47.15 and prior has Improper Input Validation in function 'Call()' of ReGa core logic process, resulting in the ability to start a Denial of Service. Due to Improper Authorization an attacker can obtain a session ID from CVE-2019-9583 or a valid gu...
Eq-3 Ccu3 Firmware
445
VMScore
CVE-2019-9727
Unauthenticated password hash disclosure in the User.getUserPWD method in eQ-3 AG Homematic CCU3 3.43.15 and previous versions allows remote malicious users to retrieve the GUI password hashes of GUI users. This vulnerability can be exploited by unauthenticated attackers with acc...
Eq-3 Ccu3 Firmware
445
VMScore
CVE-2019-9726
Directory Traversal / Arbitrary File Read in eQ-3 AG Homematic CCU3 3.43.15 and previous versions allows remote malicious users to read arbitrary files of the device's filesystem. This vulnerability can be exploited by unauthenticated attackers with access to the web interfa...
Eq-3 Ccu3 Firmware
578
VMScore
CVE-2019-14473
eQ-3 Homematic CCU2 and CCU3 use session IDs for authentication but lack authorization checks. Consequently, a valid guest level or user level account can create a new admin level account, read the service messages, clear the system protocol or modify/delete internal programs, et...
Eq-3 Ccu2 Firmware
Eq-3 Ccu3 Firmware
445
VMScore
CVE-2019-14475
eQ-3 Homematic CCU2 2.47.15 and prior and CCU3 3.47.15 and prior use session IDs for authentication but lack authorization checks. An attacker can obtain a session ID from CVE-2019-9583, resulting in the ability to read the service messages, clear the system protocol, create a ne...
Eq-3 Ccu2 Firmware
Eq-3 Ccu3 Firmware
668
VMScore
CVE-2020-12834
eQ-3 Homematic Central Control Unit (CCU)2 up to and including 2.51.6 and CCU3 up to and including 3.51.6 allow Remote Code Execution in the JSON API Method ReGa.runScript, by unauthenticated attackers with access to the web interface, due to the default auto-login feature being ...
Eq-3 Homematic Ccu2 Firmware
Eq-3 Ccu3 Firmware
668
VMScore
CVE-2019-10119
eQ-3 HomeMatic CCU2 devices prior to 2.41.8 and CCU3 devices prior to 3.43.16 use session IDs for authentication but lack authorization checks. An attacker can obtain a session ID via an invalid login attempt to the RemoteApi account, aka HMCCU-154. This leads to automatic login ...
Eq-3 Ccu3 Firmware
Eq-3 Ccu2 Firmware
578
VMScore
CVE-2019-10120
On eQ-3 HomeMatic CCU2 devices prior to 2.41.8 and CCU3 devices prior to 3.43.16, automatic login configuration (aka setAutoLogin) can be achieved by continuing to use a session ID after a logout, aka HMCCU-154.
Eq-3 Ccu3 Firmware
Eq-3 Ccu2 Firmware
668
VMScore
CVE-2019-10121
eQ-3 HomeMatic CCU2 devices prior to 2.41.8 and CCU3 devices prior to 3.43.15 use session IDs for authentication but lack authorization checks. An attacker can obtain a session ID via the user authentication dialogue, aka HMCCU-153. This leads to automatic login as admin.
Eq-3 Ccu3 Firmware
Eq-3 Ccu2 Firmware
668
VMScore
CVE-2019-10122
eQ-3 HomeMatic CCU2 devices prior to 2.41.9 and CCU3 devices prior to 3.43.16 have buffer overflows in the ReGa ise GmbH HTTP-Server 2.0 component, aka HMCCU-179. This may lead to remote code execution.
Eq-3 Ccu3 Firmware
Eq-3 Ccu2 Firmware
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2022-48700
CVE-2022-48689
CVE-2024-27956
CVE-2023-6363
SQL
NULL pointer dereference
CVE-2023-41830
CVE-2015-2051
arbitrary
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started