Vulnerability Description
An issue was discovered on Athom Homey and Homey Pro devices before 5.0.0. ZigBee hub devices should generate a unique Standard Network Key that is then exchanged with all enrolled devices so that all inter-device communication is encrypted. However, the cited Athom products use another widely known key that is designed for testing purposes: "01030507090b0d0f00020406080a0c0d" (the decimal equivalent of 1 3 5 7 9 11 13 15 0 2 4 6 8 10 12 13), which is human generated and static across all issued devices.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Homey | Homey Firmware | < 5.0.0 |
| Homey | Homey | - |
| Homey | Homey Pro Firmware | < 5.0.0 |
| Homey | Homey Pro | - |
Related Weaknesses (CWE)
References
- https://developer.athom.com/firmwareRelease NotesVendor Advisory
- https://homey.app/en-us/ProductVendor Advisory
- https://yougottahackthat.com/blog/1260/athom-homey-security-static-and-well-knowThird Party Advisory
- https://developer.athom.com/firmwareRelease NotesVendor Advisory
- https://homey.app/en-us/ProductVendor Advisory
- https://yougottahackthat.com/blog/1260/athom-homey-security-static-and-well-knowThird Party Advisory
FAQ
What is CVE-2020-28952?
CVE-2020-28952 is a vulnerability with a CVSS score of 7.5 (HIGH). An issue was discovered on Athom Homey and Homey Pro devices before 5.0.0. ZigBee hub devices should generate a unique Standard Network Key that is then exchanged with all enrolled devices so that all...
How severe is CVE-2020-28952?
CVE-2020-28952 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2020-28952?
Check the references section above for vendor advisories and patch information. Affected products include: Homey Homey Firmware, Homey Homey, Homey Homey Pro Firmware, Homey Homey Pro.