CVE-2019-15745
Severity CVSS v4.0:
Pending analysis
Type:
CWE-798
Use of Hard-coded Credentials
Publication date:
29/08/2019
Last modified:
05/09/2019
Description
The Eques elf smart plug and the mobile app use a hardcoded AES 256 bit key to encrypt the commands and responses between the device and the app. The communication happens over UDP port 27431. An attacker on the local network can use the same key to encrypt and send commands to discover all smart plugs in a network, take over control of a device, and perform actions such as turning it on and off.
Impact
Base Score 3.x
8.80
Severity 3.x
HIGH
Base Score 2.0
3.30
Severity 2.0
LOW
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:o:equeshome:elf_smart_plug_firmware:-:*:*:*:*:*:*:* | ||
cpe:2.3:h:equeshome:elf_smart_plug:-:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://github.com/iamckn/eques
- https://www.ckn.io/blog/2019/08/27/exploiting-the-eques-elf-smart-plug-part-four/
- https://www.ckn.io/blog/2019/08/27/exploiting-the-eques-elf-smart-plug-part-one/
- https://www.ckn.io/blog/2019/08/27/exploiting-the-eques-elf-smart-plug-part-three/
- https://www.ckn.io/blog/2019/08/27/exploiting-the-eques-elf-smart-plug-part-two/