Vulnerability Description
Ecobee Ecobee4 4.2.0.171 devices can be forced to deauthenticate and connect to an unencrypted Wi-Fi network with the same SSID, even if the device settings specify use of encryption such as WPA2, as long as the competing network has a stronger signal. An attacker must be able to set up a nearby SSID, similar to an "Evil Twin" attack.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Ecobee | Ecobee4 Firmware | 4.2.0.171 |
| Ecobee | Ecobee4 | - |
Related Weaknesses (CWE)
References
- https://garrettmiller.github.io/meross-mss110-vuln/ExploitThird Party Advisory
- https://garrettmiller.github.io/meross-mss110-vuln/ExploitThird Party Advisory
FAQ
What is CVE-2018-6402?
CVE-2018-6402 is a vulnerability with a CVSS score of 7.5 (HIGH). Ecobee Ecobee4 4.2.0.171 devices can be forced to deauthenticate and connect to an unencrypted Wi-Fi network with the same SSID, even if the device settings specify use of encryption such as WPA2, as ...
How severe is CVE-2018-6402?
CVE-2018-6402 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-6402?
Check the references section above for vendor advisories and patch information. Affected products include: Ecobee Ecobee4 Firmware, Ecobee Ecobee4.