Описание
An issue in TPLink Smart Bulb Tapo series L530 before 1.2.4, L510E before 1.1.0, L630 before 1.0.4, P100 before 1.5.0, and Tapo Application 2.8.14 allows a remote attacker to replay old messages encrypted with a still valid session key.
Ссылки
- Technical DescriptionThird Party Advisory
- Third Party Advisory
- Technical DescriptionThird Party Advisory
- Third Party Advisory
Уязвимые конфигурации
Конфигурация 1
Одновременно
cpe:2.3:o:tp-link:tapo_l530e_firmware:1.0.0:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:tapo_l530e:-:*:*:*:*:*:*:*
Конфигурация 2
cpe:2.3:a:tp-link:tapo:2.8.14:*:*:*:*:*:*:*
EPSS
Процентиль: 48%
0.00253
Низкий
7.5 High
CVSS3
Дефекты
NVD-CWE-noinfo
Связанные уязвимости
CVSS3: 7.5
github
больше 2 лет назад
An issue in TPLink Smart bulb Tapo series L530 v.1.0.0 and Tapo Application v.2.8.14 allows a remote attacker to obtain sensitive information via session key in the message function.
EPSS
Процентиль: 48%
0.00253
Низкий
7.5 High
CVSS3
Дефекты
NVD-CWE-noinfo