CVE-2023-36623
https://notcve.org/view.php?id=CVE-2023-36623
The root password of the Loxone Miniserver Go Gen.2 before 14.2 is calculated using hard-coded secrets and the MAC address. This allows a local user to calculate the root password and escalate privileges. • https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2023-013.txt https://www.syss.de/pentest-blog/root-zugang-zu-smarthome-server-loxone-miniserver-go-gen-2-syss-2023-004/-012/-013 • CWE-798: Use of Hard-coded Credentials •
CVE-2023-36622
https://notcve.org/view.php?id=CVE-2023-36622
The websocket configuration endpoint of the Loxone Miniserver Go Gen.2 before 14.1.5.9 allows remote authenticated administrators to inject arbitrary OS commands via the timezone parameter. • https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2023-012.txt https://www.syss.de/pentest-blog/root-zugang-zu-smarthome-server-loxone-miniserver-go-gen-2-syss-2023-004/-012/-013 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •
CVE-2023-36624
https://notcve.org/view.php?id=CVE-2023-36624
Loxone Miniserver Go Gen.2 through 14.0.3.28 allows an authenticated operating system user to escalate privileges via the Sudo configuration. This allows the elevated execution of binaries without a password requirement. • https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2023-004.txt https://www.syss.de/pentest-blog/root-zugang-zu-smarthome-server-loxone-miniserver-go-gen-2-syss-2023-004/-012/-013 • CWE-862: Missing Authorization •
CVE-2020-27488
https://notcve.org/view.php?id=CVE-2020-27488
Loxone Miniserver devices with firmware before 11.1 (aka 11.1.9.3) are unable to use an authentication method that is based on the "signature of the update package." Therefore, these devices (or attackers who are spoofing these devices) can continue to use an unauthenticated cloud service for an indeterminate time period (possibly forever). Once an individual device's firmware is updated, and authentication occurs once, the cloud service recategorizes the device so that authentication is subsequently always required, and spoofing cannot occur. Los dispositivos Loxone Miniserver con versiones de firmware anteriores a 11.1 (también se conoce como versión 11.1.9.3) no pueden utilizar un método de autenticación que se base en la "signature of the update package". Por lo tanto, estos dispositivos (o atacantes que falsifican estos dispositivos) pueden continuar usando un servicio en la nube no autenticado durante un período de tiempo indeterminado (posiblemente para siempre). • https://iot-lab-fh-ooe.github.io/loxone_clouddns_schwachstelle https://iot-lab-fh-ooe.github.io/loxone_clouddns_vulnerability https://www.loxone.com/dede/sicherheit-cloud-dns https://www.loxone.com/enen/security-cloud-dns • CWE-287: Improper Authentication •