MEDIUMCVE-2021-20989CVSS 5.9

Fibaro Home Center Autorisation insuffisante du serveur d'accès distant

Plateforme

other

Composant

fibaro-home-center

Corrigé dans

4.600.1

4.600.1

AI Confidence: highNVDEPSS 1.8%Révisé: mai 2026
Traduction vers votre langue…

CVE-2021-20989 is a vulnerability affecting Fibaro Home Center 2 and Lite devices running firmware versions up to 4.600. The vulnerability allows an attacker to intercept SSH connections initiated by the device to the Fibaro cloud through a DNS spoofing attack. This can lead to unauthorized access to the device's web management interface, potentially compromising sensitive data and control of the home automation system.

Impact et Scénarios d'Attaquetraduction en cours…

The primary impact of CVE-2021-20989 lies in the potential for unauthorized remote access to the Fibaro Home Center. An attacker successfully spoofing the DNS resolution can establish a connection to the device and, if they possess valid credentials for the web management interface, gain full control. This control could be used to modify device settings, access sensitive data stored on the device (such as user credentials or home automation rules), or even use the device as a pivot point to attack other devices on the network. The attack leverages the device's built-in remote access and support features, making it particularly insidious as it exploits a legitimate functionality for malicious purposes. Successful exploitation could lead to a complete compromise of the home network.

Contexte d'Exploitationtraduction en cours…

CVE-2021-20989 was publicly disclosed on April 19, 2021. There is no indication of active exploitation campaigns or inclusion in the CISA KEV catalog at this time. Public proof-of-concept exploits are not widely available, but the vulnerability's nature makes it potentially attractive to threat actors with the technical expertise to perform DNS spoofing attacks.

Qui Est à Risquetraduction en cours…

Users of Fibaro Home Center 2 and Lite devices running firmware versions 4.600 and earlier are at risk. This includes individuals and small businesses relying on Fibaro for home automation and security. Shared hosting environments where multiple users share a Fibaro Home Center instance are particularly vulnerable.

Étapes de Détectiontraduction en cours…

• linux / server:

journalctl -u fibaro-home-center | grep -i "ssh connection"

• generic web: Check access logs for unusual IP addresses or requests to the Home Center's web interface. Look for patterns indicative of DNS spoofing attempts. • other: Monitor DNS server logs for suspicious DNS queries targeting the Fibaro Home Center's domain.

Chronologie de l'Attaque

  1. Disclosure

    disclosure

Renseignement sur les Menaces

Statut de l'Exploit

Preuve de ConceptInconnu
CISA KEVNO
Exposition InternetÉlevée

EPSS

1.84% (percentile 83%)

Vecteur CVSS

RENSEIGNEMENT SUR LES MENACES· CVSS 3.1CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N5.9MEDIUMAttack VectorNetworkComment l'attaquant atteint la cibleAttack ComplexityHighConditions requises pour exploiterPrivileges RequiredNoneNiveau d'authentification requisUser InteractionNoneSi une action de la victime est requiseScopeUnchangedImpact au-delà du composant affectéConfidentialityHighRisque d'exposition de données sensiblesIntegrityNoneRisque de modification non autorisée de donnéesAvailabilityNoneRisque d'interruption de servicenextguardhq.com · Score de base CVSS v3.1
Que signifient ces métriques?
Attack Vector
Réseau — exploitable à distance via internet. Aucun accès physique ou local requis.
Attack Complexity
Élevée — nécessite une condition de course, configuration non standard ou circonstances spécifiques.
Privileges Required
Aucun — sans authentification. Aucune identifiant requis pour exploiter.
User Interaction
Aucune — attaque automatique et silencieuse. La victime ne fait rien.
Scope
Inchangé — impact limité au composant vulnérable.
Confidentiality
Élevé — perte totale de confidentialité. L'attaquant peut lire toutes les données.
Integrity
Aucun — aucun impact sur l'intégrité.
Availability
Aucun — aucun impact sur la disponibilité.

Logiciel Affecté

Composantfibaro-home-center
FournisseurFibar Group S.A
Plage affectéeCorrigé dans
Home Center 2 – 4.6004.600.1
Home Center Lite – 4.6004.600.1

Classification de Faiblesse (CWE)

Chronologie

  1. Réservé
  2. Publiée
  3. Modifiée
  4. EPSS mis à jour
Sans correctif — 1861 jours depuis la divulgation

Mitigation et Contournementstraduction en cours…

The primary mitigation for CVE-2021-20989 is to upgrade the Fibaro Home Center firmware to a version that addresses the vulnerability. Fibaro has not released a specific fixed version in the provided data, so users should monitor the Fibaro website for updates. As a temporary workaround, consider disabling remote access features on the Home Center if they are not essential. Implementing DNSSEC (DNS Security Extensions) on your network can help prevent DNS spoofing attacks, although this requires configuration changes at your DNS provider. Regularly review the Home Center's access logs for any suspicious activity.

Comment corriger

Mettre à jour le firmware des appareils Fibaro Home Center 2 et Lite à une version ultérieure à la 4.600. Cela corrige la vulnérabilité d'interception de la connexion SSH et l'accès non autorisé potentiel à l'interface de gestion web.

Newsletter Sécurité CVE

Analyses de vulnérabilités et alertes critiques directement dans votre boîte mail.

Questions fréquentestraduction en cours…

What is CVE-2021-20989 — DNS Spoofing in Fibaro Home Center?

CVE-2021-20989 is a vulnerability in Fibaro Home Center ≤4.600 that allows attackers to intercept SSH connections via DNS spoofing, potentially gaining access to the device's management interface.

Am I affected by CVE-2021-20989 in Fibaro Home Center?

You are affected if you are using Fibaro Home Center 2 or Lite with firmware version 4.600 or earlier. Check your device's firmware version and upgrade if possible.

How do I fix CVE-2021-20989 in Fibaro Home Center?

Upgrade your Fibaro Home Center firmware to a patched version. Monitor the Fibaro website for updates. As a temporary measure, disable remote access features if not essential.

Is CVE-2021-20989 being actively exploited?

There is no confirmed evidence of active exploitation at this time, but the vulnerability's nature makes it a potential target.

Where can I find the official Fibaro advisory for CVE-2021-20989?

Refer to the Fibaro security advisory page for the latest information and updates regarding CVE-2021-20989: [https://www.fibaro.com/security-advisories/](https://www.fibaro.com/security-advisories/)

Ton projet est-il affecté ?

Téléverse ton fichier de dépendances et découvre instantanément si cette CVE et d'autres te touchent.