CVE-2024-5743

9.8 CRITICAL

📋 TL;DR

This vulnerability in EveHome Eve Play allows attackers to exploit weak password hashing to execute arbitrary code on affected devices. It affects all Eve Play devices running firmware version 1.1.42 or earlier. Attackers could potentially take full control of vulnerable devices.

💻 Affected Systems

Products:
  • EveHome Eve Play
Versions: through 1.1.42
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: All devices with affected firmware versions are vulnerable regardless of configuration.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device compromise allowing attacker to execute arbitrary code, steal credentials, pivot to internal networks, and maintain persistent access.

🟠

Likely Case

Device takeover leading to unauthorized access to smart home systems, data exfiltration, and potential lateral movement within the network.

🟢

If Mitigated

Limited impact if devices are isolated from critical networks and have strong perimeter controls, though device compromise would still occur.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

CWE-916 indicates insufficient computational effort in password hashing, which typically leads to relatively straightforward exploitation once the vulnerability is understood.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.1.43 or later

Vendor Advisory: https://www.evehome.com/en-us/security-content

Restart Required: Yes

Instructions:

1. Check current firmware version in Eve app. 2. If version is 1.1.42 or earlier, update through Eve app. 3. Restart device after update. 4. Verify update completed successfully.

🔧 Temporary Workarounds

Network Isolation

all

Isolate Eve Play devices from critical networks and internet access

Access Control

all

Implement strict network access controls to limit device communication

🧯 If You Can't Patch

  • Immediately disconnect vulnerable devices from networks containing sensitive systems
  • Implement strict network segmentation and monitor all traffic to/from Eve Play devices

🔍 How to Verify

Check if Vulnerable:

Check firmware version in Eve app: Settings > About > Firmware Version. If version is 1.1.42 or earlier, device is vulnerable.

Check Version:

Check via Eve mobile app: Settings > About > Firmware Version

Verify Fix Applied:

After update, verify firmware version shows 1.1.43 or later in Eve app.

📡 Detection & Monitoring

Log Indicators:

  • Unusual authentication attempts
  • Unexpected firmware modification logs
  • Abnormal network connections from device

Network Indicators:

  • Unusual outbound connections from Eve Play device
  • Suspicious authentication traffic patterns
  • Unexpected protocol usage

SIEM Query:

source="eve-play" AND (event_type="auth_failure" OR event_type="firmware_change")

🔗 References

📤 Share & Export