CVE-2020-21990
📋 TL;DR
CVE-2020-21990 is an information disclosure vulnerability in Emmanuel MyDomoAtHome (MDAH) REST API Domoticz ISS Gateway that allows unauthenticated remote attackers to access sensitive information via specially crafted requests. This affects systems running version 0.2.40 of the software, potentially exposing configuration data, device information, or other sensitive details.
💻 Affected Systems
- Emmanuel MyDomoAtHome (MDAH) REST API Domoticz ISS Gateway
📦 What is this software?
Mydomoathome by Domoticz
⚠️ Risk & Real-World Impact
Worst Case
Attackers gain full access to sensitive system information, device configurations, and potentially credentials, leading to complete system compromise or lateral movement within the network.
Likely Case
Unauthenticated attackers access configuration files, device lists, and system information that could be used for further attacks or reconnaissance.
If Mitigated
Proper authentication controls prevent unauthorized access, limiting exposure to authenticated users only.
🎯 Exploit Status
Public exploit code is available, making exploitation trivial for attackers with network access to vulnerable systems.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Versions after 0.2.40
Vendor Advisory: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5555.php
Restart Required: Yes
Instructions:
1. Upgrade to the latest version of MyDomoAtHome REST API Domoticz ISS Gateway. 2. Verify the version is greater than 0.2.40. 3. Restart the service to apply changes.
🔧 Temporary Workarounds
Network Access Restriction
linuxRestrict network access to the MDAH REST API to trusted IP addresses only
iptables -A INPUT -p tcp --dport [API_PORT] -s [TRUSTED_IP] -j ACCEPT
iptables -A INPUT -p tcp --dport [API_PORT] -j DROP
Reverse Proxy with Authentication
allPlace the API behind a reverse proxy with authentication requirements
🧯 If You Can't Patch
- Implement strict network segmentation to isolate the vulnerable system from untrusted networks
- Deploy a web application firewall (WAF) with rules to block unauthorized API requests
🔍 How to Verify
Check if Vulnerable:
Check if the system is running version 0.2.40 of MyDomoAtHome REST API Domoticz ISS Gateway and test for unauthenticated access to API endpoints.
Check Version:
Check the software documentation or configuration files for version information specific to your installation method
Verify Fix Applied:
Verify the version is greater than 0.2.40 and test that unauthenticated requests to sensitive API endpoints are properly rejected.
📡 Detection & Monitoring
Log Indicators:
- Unauthenticated requests to sensitive API endpoints
- Multiple failed authentication attempts followed by successful unauthenticated access
Network Indicators:
- Unusual traffic patterns to API endpoints from untrusted sources
- Requests bypassing authentication mechanisms
SIEM Query:
source="mydomohome.log" AND (http_status=200 OR http_status=403) AND user="-" AND uri="/api/*"