CVE-2024-52329
Published: 23 January 2025
Description
Adversaries may alter data en route to storage or other systems in order to manipulate external outcomes or hide activity, thus threatening the integrity of the data.
Security Summary
CVE-2024-52329 is a vulnerability in the ECOVACS HOME mobile app plugins for specific robots, stemming from improper validation of TLS certificates (CWE-295). Published on 2025-01-23, it carries a CVSS v3.1 base score of 7.4 (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N), indicating high confidentiality and integrity impacts with no availability disruption.
An unauthenticated attacker can exploit this vulnerability over the network, though it requires high attack complexity. Successful exploitation allows the attacker to read or modify TLS traffic, enabling the theft of authentication tokens from affected communications.
The Ecovacs security advisory DSA-20241217001 provides details on mitigation at https://www.ecovacs.com/global/userhelp/dsa20241217001. Further technical analysis appears in research presentations, including 37C3 2023 (https://dontvacuum.me/talks/37c3-2023/37c3-vacuuming-and-mowing.pdf) and HITCON 2024 (https://dontvacuum.me/talks/HITCON2024/HITCON-CMT-2024_Ecovacs.pdf).
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise Techniques
Why these techniques?
Improper TLS certificate validation enables unauthenticated MITM attacks (T1557) to intercept/modify traffic, steal authentication tokens (T1528), and manipulate transmitted data (T1565.002).