MEDIUMCVE-2021-20989CVSS 5.9

Fibaro Home Center Onvoldoende autorisatie van de remote access server

Platform

other

Component

fibaro-home-center

Opgelost in

4.600.1

4.600.1

AI Confidence: highNVDEPSS 1.8%Beoordeeld: mei 2026
Wordt vertaald naar uw taal…

CVE-2021-20989 is a vulnerability affecting Fibaro Home Center 2 and Lite devices running firmware versions up to 4.600. The vulnerability allows an attacker to intercept SSH connections initiated by the device to the Fibaro cloud through a DNS spoofing attack. This can lead to unauthorized access to the device's web management interface, potentially compromising sensitive data and control of the home automation system.

Impact en Aanvalsscenarioswordt vertaald…

The primary impact of CVE-2021-20989 lies in the potential for unauthorized remote access to the Fibaro Home Center. An attacker successfully spoofing the DNS resolution can establish a connection to the device and, if they possess valid credentials for the web management interface, gain full control. This control could be used to modify device settings, access sensitive data stored on the device (such as user credentials or home automation rules), or even use the device as a pivot point to attack other devices on the network. The attack leverages the device's built-in remote access and support features, making it particularly insidious as it exploits a legitimate functionality for malicious purposes. Successful exploitation could lead to a complete compromise of the home network.

Uitbuitingscontextwordt vertaald…

CVE-2021-20989 was publicly disclosed on April 19, 2021. There is no indication of active exploitation campaigns or inclusion in the CISA KEV catalog at this time. Public proof-of-concept exploits are not widely available, but the vulnerability's nature makes it potentially attractive to threat actors with the technical expertise to perform DNS spoofing attacks.

Wie Loopt Risicowordt vertaald…

Users of Fibaro Home Center 2 and Lite devices running firmware versions 4.600 and earlier are at risk. This includes individuals and small businesses relying on Fibaro for home automation and security. Shared hosting environments where multiple users share a Fibaro Home Center instance are particularly vulnerable.

Detectiestappenwordt vertaald…

• linux / server:

journalctl -u fibaro-home-center | grep -i "ssh connection"

• generic web: Check access logs for unusual IP addresses or requests to the Home Center's web interface. Look for patterns indicative of DNS spoofing attempts. • other: Monitor DNS server logs for suspicious DNS queries targeting the Fibaro Home Center's domain.

Aanvalstijdlijn

  1. Disclosure

    disclosure

Dreigingsinformatie

Exploit Status

Proof of ConceptOnbekend
CISA KEVNO
InternetblootstellingHoog

EPSS

1.84% (83% percentiel)

CVSS-vector

DREIGINGSINFORMATIE· CVSS 3.1CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N5.9MEDIUMAttack VectorNetworkHoe de aanvaller het doel bereiktAttack ComplexityHighVereiste omstandigheden om te exploiterenPrivileges RequiredNoneVereist authenticatieniveau voor aanvalUser InteractionNoneOf het slachtoffer actie moet ondernemenScopeUnchangedImpact buiten het getroffen onderdeelConfidentialityHighRisico op blootstelling van gevoelige dataIntegrityNoneRisico op ongeautoriseerde gegevenswijzigingAvailabilityNoneRisico op verstoring van dienstennextguardhq.com · CVSS v3.1 Basisscore
Wat betekenen deze metrics?
Attack Vector
Netwerk — op afstand uitbuitbaar via internet. Geen fysieke of lokale toegang vereist.
Attack Complexity
Hoog — vereist een race condition, niet-standaard configuratie of specifieke omstandigheden.
Privileges Required
Geen — geen authenticatie vereist om te exploiteren.
User Interaction
Geen — automatische en stille aanval. Slachtoffer doet niets.
Scope
Ongewijzigd — impact beperkt tot het kwetsbare component.
Confidentiality
Hoog — volledig verlies van vertrouwelijkheid. Aanvaller kan alle gegevens lezen.
Integrity
Geen — geen integriteitsimpact.
Availability
Geen — geen beschikbaarheidsimpact.

Getroffen Software

Componentfibaro-home-center
LeverancierFibar Group S.A
Getroffen bereikOpgelost in
Home Center 2 – 4.6004.600.1
Home Center Lite – 4.6004.600.1

Zwakheidsclassificatie (CWE)

Tijdlijn

  1. Gereserveerd
  2. Gepubliceerd
  3. Gewijzigd
  4. EPSS bijgewerkt
Geen patch — 1861 dagen na openbaarmaking

Mitigatie en Workaroundswordt vertaald…

The primary mitigation for CVE-2021-20989 is to upgrade the Fibaro Home Center firmware to a version that addresses the vulnerability. Fibaro has not released a specific fixed version in the provided data, so users should monitor the Fibaro website for updates. As a temporary workaround, consider disabling remote access features on the Home Center if they are not essential. Implementing DNSSEC (DNS Security Extensions) on your network can help prevent DNS spoofing attacks, although this requires configuration changes at your DNS provider. Regularly review the Home Center's access logs for any suspicious activity.

Hoe te verhelpen

Actualiseer de firmware van de Fibaro Home Center 2 en Lite apparaten naar een versie later dan 4.600. Dit corrigeert de kwetsbaarheid van het onderscheppen van de SSH verbinding en de mogelijke ongeautoriseerde toegang tot de web management interface.

CVE Beveiligingsnieuwsbrief

Kwetsbaarheidsanalyses en kritieke waarschuwingen direct in uw inbox.

Veelgestelde vragenwordt vertaald…

What is CVE-2021-20989 — DNS Spoofing in Fibaro Home Center?

CVE-2021-20989 is a vulnerability in Fibaro Home Center ≤4.600 that allows attackers to intercept SSH connections via DNS spoofing, potentially gaining access to the device's management interface.

Am I affected by CVE-2021-20989 in Fibaro Home Center?

You are affected if you are using Fibaro Home Center 2 or Lite with firmware version 4.600 or earlier. Check your device's firmware version and upgrade if possible.

How do I fix CVE-2021-20989 in Fibaro Home Center?

Upgrade your Fibaro Home Center firmware to a patched version. Monitor the Fibaro website for updates. As a temporary measure, disable remote access features if not essential.

Is CVE-2021-20989 being actively exploited?

There is no confirmed evidence of active exploitation at this time, but the vulnerability's nature makes it a potential target.

Where can I find the official Fibaro advisory for CVE-2021-20989?

Refer to the Fibaro security advisory page for the latest information and updates regarding CVE-2021-20989: [https://www.fibaro.com/security-advisories/](https://www.fibaro.com/security-advisories/)

Is jouw project getroffen?

Upload je dependency-bestand en kom direct te weten of deze en andere CVEs jou raken.