{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-10T02:36:25.400","vulnerabilities":[{"cve":{"id":"CVE-2020-24395","sourceIdentifier":"cve@mitre.org","published":"2021-05-20T14:15:07.583","lastModified":"2024-11-21T05:14:44.453","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The USB firmware update script of homee Brain Cube v2 (2.28.2 and 2.28.4) devices allows an attacker with physical access to install compromised firmware. This occurs because of insufficient validation of the firmware image file and can lead to code execution on the device."},{"lang":"es","value":"El script de actualización de firmware USB de los dispositivos homee Brain Cube versión v2 (versiones 2.28.2 y 2.28.4) permite a un atacante con acceso físico instalar firmware comprometido.&#xa0;Esto ocurre debido a una comprobación insuficiente del archivo imagen del firmware y puede conllevar a una ejecución de código en el dispositivo"}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":6.8,"baseSeverity":"MEDIUM","attackVector":"PHYSICAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":0.9,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-345"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:hom.ee:brain_cube_core:2.28.2:*:*:*:*:*:*:*","matchCriteriaId":"05631838-F28D-439C-94D0-65C12A71645A"},{"vulnerable":true,"criteria":"cpe:2.3:o:hom.ee:brain_cube_core:2.28.4:*:*:*:*:*:*:*","matchCriteriaId":"D467A822-BD79-448E-9A14-76DE497317B6"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:hom.ee:brain_cube:-:*:*:*:*:*:*:*","matchCriteriaId":"F03712FC-3AD9-48C2-8633-6DDAB183EAB7"}]}]}],"references":[{"url":"https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2020-026.txt","source":"cve@mitre.org","tags":["Third Party Advisory"]},{"url":"https://www.syss.de/pentest-blog/","source":"cve@mitre.org","tags":["Third Party Advisory"]},{"url":"https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2020-026.txt","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"https://www.syss.de/pentest-blog/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}}]}