CVE-2017-14454
moderate-risk
Published 2023-01-12
Multiple exploitable buffer overflow vulnerabilities exists in the PubNub message handler for the "control" channel of Insteon Hub running firmware version 1012. Specially crafted replies received from the PubNub service can cause buffer overflows on a global section overwriting arbitrary data. An attacker should impersonate PubNub and answer an HTTPS GET request to trigger this vulnerability. The `strcpy` at [18] overflows the buffer `insteon_pubnub.channel_al`, which has a size of 16 bytes.
Do I need to act?
-
0.53% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
8
CVSS 8.5/10
High
NETWORK
/ HIGH complexity
Affected Products (1)
Affected Vendors
References (2)
Technical Description
https://talosintelligence.com/vulnerability_reports/TALOS-2017-0502
Technical Description
https://talosintelligence.com/vulnerability_reports/TALOS-2017-0502
32
/ 100
moderate-risk
Severity
25/34 · High
Exploitability
2/34 · Minimal
Exposure
5/34 · Minimal