CVE-2024-48776

7.5 HIGH

📋 TL;DR

A vulnerability in Shelly com.home.shelly 1.0.4 allows remote attackers to access sensitive information through the firmware update process. This affects users of the Shelly home automation system who haven't updated their devices. Attackers can potentially retrieve confidential data without authentication.

💻 Affected Systems

Products:
  • Shelly com.home.shelly
Versions: 1.0.4
Operating Systems: Android, iOS
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the mobile application controlling Shelly smart home devices. The vulnerability is in the firmware update mechanism within the app.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers obtain device credentials, configuration data, or encryption keys, leading to complete device compromise, unauthorized control of smart home devices, or lateral movement within the network.

🟠

Likely Case

Attackers retrieve device identifiers, network configurations, or limited system information that could facilitate further attacks or reconnaissance.

🟢

If Mitigated

With proper network segmentation and access controls, attackers can only access limited information without gaining further network access.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The GitHub reference contains detailed exploitation information. The vulnerability involves intercepting or manipulating firmware update requests to extract sensitive data.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Unknown

Restart Required: No

Instructions:

Check Shelly official channels for updates. Update the Shelly mobile app when a patched version becomes available. Update firmware on Shelly devices if applicable.

🔧 Temporary Workarounds

Disable automatic firmware updates

all

Prevent the vulnerable update process from running automatically

Network segmentation

all

Isolate Shelly devices and mobile app from untrusted networks

🧯 If You Can't Patch

  • Restrict network access to Shelly devices and mobile app to trusted networks only
  • Monitor network traffic for unusual firmware update requests or data exfiltration

🔍 How to Verify

Check if Vulnerable:

Check if using Shelly com.home.shelly version 1.0.4 on mobile device. Review app settings for firmware update functionality.

Check Version:

On mobile device: App Settings > About or check app store for version information

Verify Fix Applied:

Update to a version later than 1.0.4 when available. Verify firmware update process no longer exposes sensitive information.

📡 Detection & Monitoring

Log Indicators:

  • Unusual firmware update requests
  • Unexpected data transfers during update process
  • Failed update attempts from unknown sources

Network Indicators:

  • HTTP/HTTPS requests to firmware update endpoints containing sensitive data
  • Unencrypted transmission of device information

SIEM Query:

source="shelly_app" AND (event="firmware_update" OR url="*firmware*" OR data_transfer>100KB)

🔗 References

📤 Share & Export