Vulnerability Description
Specially crafted commands sent through the PubNub service in Insteon Hub 2245-222 with firmware version 1012 can cause a stack-based buffer overflow overwriting arbitrary data. An attacker should send an authenticated HTTP request to trigger this vulnerability.At 0x9d014cc0 the value for the cmd key is copied using strcpy to the buffer at $sp+0x11c. This buffer is 20 bytes large, sending anything longer will cause a buffer overflow.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Insteon | Hub Firmware | 1012 |
| Insteon | Hub 2245-222 | - |
Related Weaknesses (CWE)
References
- https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0483ExploitIssue TrackingThird Party Advisory
- https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0483ExploitIssue TrackingThird Party Advisory
FAQ
What is CVE-2017-16252?
CVE-2017-16252 is a vulnerability with a CVSS score of 8.1 (HIGH). Specially crafted commands sent through the PubNub service in Insteon Hub 2245-222 with firmware version 1012 can cause a stack-based buffer overflow overwriting arbitrary data. An attacker should sen...
How severe is CVE-2017-16252?
CVE-2017-16252 has been rated HIGH with a CVSS base score of 8.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-16252?
Check the references section above for vendor advisories and patch information. Affected products include: Insteon Hub Firmware, Insteon Hub 2245-222.