Vulnerability Description
eQ-3 Homematic CCU2 and CCU3 use session IDs for authentication but lack authorization checks. Consequently, a valid guest level or user level account can create a new admin level account, read the service messages, clear the system protocol or modify/delete internal programs, etc. pp.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Eq-3 | Ccu2 Firmware | <= 2.47.15 |
| Eq-3 | Ccu2 | - |
| Eq-3 | Ccu3 Firmware | <= 3.47.15 |
| Eq-3 | Ccu3 | - |
Related Weaknesses (CWE)
References
- https://psytester.github.io/CVE-2019-14473ExploitThird Party Advisory
- https://psytester.github.io/CVE-2019-14473ExploitThird Party Advisory
FAQ
What is CVE-2019-14473?
CVE-2019-14473 is a vulnerability with a CVSS score of 8.8 (HIGH). eQ-3 Homematic CCU2 and CCU3 use session IDs for authentication but lack authorization checks. Consequently, a valid guest level or user level account can create a new admin level account, read the se...
How severe is CVE-2019-14473?
CVE-2019-14473 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-14473?
Check the references section above for vendor advisories and patch information. Affected products include: Eq-3 Ccu2 Firmware, Eq-3 Ccu2, Eq-3 Ccu3 Firmware, Eq-3 Ccu3.