Severity
7.8HIGH
EPSS
0.1%
top 83.26%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedAug 23
Latest updateMay 13

Description

On Samsung SmartThings Hub STH-ETH-250 devices with firmware version 0.20.17, the video-core process insecurely extracts the fields from the "shard" table of its SQLite database, leading to a buffer overflow on the stack. The strcpy call overflows the destination buffer, which has a size of 128 bytes. An attacker can send an arbitrarily long "secretKey" value in order to exploit this vulnerability.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages2 packages

CVEListV5samsung/smartthings_hub_sth-eth-250Firmware version 0.20.17

🔴Vulnerability Details

2
GHSA
GHSA-jf9m-gjvc-r854: On Samsung SmartThings Hub STH-ETH-250 devices with firmware version 02022-05-13
CVEList
CVE-2018-3912: On Samsung SmartThings Hub STH-ETH-250 devices with firmware version 02018-08-23
CVE-2018-3912 (HIGH CVSS 7.8) | On Samsung SmartThings Hub STH-ETH- | cvebase.io