{"vuid":"VU#418072","idnumber":"418072","name":"Comcast XFINITY Home Security fails to properly handle wireless communications disruption","keywords":["comcast","xfinity","home security","zigbee","fail open"],"overview":"Comcast XFINITY Home Security does not fail securely, which may be leveraged to avoid triggering alarm events.","clean_desc":"CWE-636: Not Failing Securely ('Failing Open') Comcast XFINITY Home Security system components use the ZigBee communication protocol over a 2.4 GHz radio frequency band to maintain state between sensors and the base station. When component communications are disrupted, the system does not trigger any alerts and additionally may take from minutes to hours to re-establish communications, during which time no alarm escalation occurs. An attacker capable of disrupting wireless communications can avoid triggering Home Security alarm events. For more details, refer to Rapid7's disclosure.","impact":"A physically proximate attacker capable of disrupting wireless communications can avoid triggering Home Security system alarm events.","resolution":"The CERT/CC is currently unaware of a practical solution to this problem.","workarounds":"","sysaffected":"","thanks":"Thanks to Tod Beardsley and Phil Bosco of Rapid7, Inc, for reporting this vulnerability.","author":"This document was written by Joel Land.","public":["https://community.rapid7.com/community/infosec/blog/2016/01/05/r7-2015-23-comcast-xfinity-home-security-system-insecure-fail-open","http://www.xfinity.com/home-security","http://www.wired.com/2016/01/xfinitys-security-system-flaws-open-homes-to-thieves/","https://cwe.mitre.org/data/definitions/636.html"],"cveids":[""],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2015-11-24T13:57:15Z","publicdate":"2016-01-05T00:00:00Z","datefirstpublished":"2016-01-05T16:48:43Z","dateupdated":"2016-01-05T16:48:43Z","revision":11,"vrda_d1_directreport":"1","vrda_d1_population":"2","vrda_d1_impact":"2","cam_widelyknown":"0","cam_exploitation":"0","cam_internetinfrastructure":"0","cam_population":"0","cam_impact":"0","cam_easeofexploitation":"0","cam_attackeraccessrequired":"0","cam_scorecurrent":"0","cam_scorecurrentwidelyknown":"0","cam_scorecurrentwidelyknownexploited":"0","ipprotocol":"","cvss_accessvector":"A","cvss_accesscomplexity":"L","cvss_authentication":null,"cvss_confidentialityimpact":"N","cvss_integrityimpact":"N","cvss_availabilityimpact":"P","cvss_exploitablity":null,"cvss_remediationlevel":"U","cvss_reportconfidence":"UR","cvss_collateraldamagepotential":"LM","cvss_targetdistribution":"M","cvss_securityrequirementscr":"ND","cvss_securityrequirementsir":"ND","cvss_securityrequirementsar":"H","cvss_basescore":"3.3","cvss_basevector":"AV:A/AC:L/Au:N/C:N/I:N/A:P","cvss_temporalscore":"2.8","cvss_environmentalscore":"4.19091114993174","cvss_environmentalvector":"CDP:LM/TD:M/CR:ND/IR:ND/AR:H","metric":0.0,"vulnote":null}