The vulnerability was detected by researchers at Cisco Talos and was assigned the identifier CVE-2018-7437. A remote attacker could trick a user into visiting a specially crafted website and exploit this vulnerability to obtain sensitive information such as usernames, passwords, and potentially email addresses, etc.

Aethon TUG Home Base Server versions prior to version 24 are affected by an unauthenticated attacker who can freely access hashed user credentials.

Aethon Home Base Server - Overview

Aethon TUG Home Base Server is an Internet of Things (IoT) based platform that enables its users to remotely control a wide array of home appliances and devices. In order to do so, the product uses a proprietary protocol called AethonMessage which has been documented by researchers.

Despite having documented the protocol, there is still no authentication mechanism in place to validate that the user sending data is legitimate. This means that attackers can send arbitrary messages to trick users into visiting specially crafted web pages which will allow them access to user credentials. So, if an attacker was able to convince a user into visiting a specially crafted website, they would be able to obtain sensitive information such as usernames, passwords, and potentially email addresses etc.

Aethon TUG Home Base Server - Description and Severity

Aethon TUG Home Base Server is a web-based management system for Aethon TUG. It allows the user to view and control all aspects of the thermostats, including power and fan settings, from any internet-connected device. A remote attacker can exploit this vulnerability by tricking a user into visiting a specially crafted website and allowing access to sensitive information such as usernames, passwords, and potentially email addresses, etc.
The severity of this vulnerability is moderate with respect to the Common Vulnerabilities and Exposures (CVE) scale.

Aethon TUG Home Base Server - Details

Aethon TUG Home Base Server is vulnerable to a remote code execution vulnerability. This vulnerability could potentially allow an attacker to execute arbitrary code on the system by convincing the target user to visit a specially crafted website. The attacker would need to convince the user that they are visiting a trusted site, such as Facebook or Google.
If exploited, this vulnerability could lead to sensitive information disclosure and privilege escalation.

Aethon TUG Home Base Server – What is it and Why is it Important?

Aethon TUG Home Base Server is a software-based solution that allows users to manage home automation and web-enabled appliances. This software can be installed on a computer or other device. It has a multitude of features and offers the ability to monitor and control many aspects of your appliances, including security, energy usage, door locks, etc.
It is important because it's a central location that provides access to all home devices installed on your network. This software was designed with security in mind so you are able to protect your devices from intruders. The vulnerability was discovered by Cisco Talos as they were looking for vulnerabilities within the TUG platform.

Timeline

Published on: 10/21/2022 16:15:00 UTC
Last modified on: 10/21/2022 20:57:00 UTC

References