Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Ecobee3_lite_firmware
(Ecobee)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 3 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2021-08-03 | CVE-2021-27952 | Hardcoded default root credentials exist on the ecobee3 lite 4.5.81.200 device. This allows a threat actor to gain access to the password-protected bootloader environment through the serial console. | Ecobee3_lite_firmware | 9.8 | ||
2021-08-03 | CVE-2021-27953 | A NULL pointer dereference vulnerability exists on the ecobee3 lite 4.5.81.200 device in the HomeKit Wireless Access Control setup process. A threat actor can exploit this vulnerability to cause a denial of service, forcing the device to reboot via a crafted HTTP request. | Ecobee3_lite_firmware | 7.5 | ||
2021-08-03 | CVE-2021-27954 | A heap-based buffer overflow vulnerability exists on the ecobee3 lite 4.5.81.200 device in the HKProcessConfig function of the HomeKit Wireless Access Control setup process. A threat actor can exploit this vulnerability to force the device to connect to a SSID or cause a denial of service. | Ecobee3_lite_firmware | 8.2 |