Логотип exploitDog
bind:CVE-2025-6521
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-6521

Количество 2

Количество 2

nvd логотип

CVE-2025-6521

8 месяцев назад

During the initial setup of the device the user connects to an access point broadcast by the Sight Bulb Pro. During the negotiation, AES Encryption keys are passed in cleartext. If captured, an attacker may be able to decrypt communications between the management app and the Sight Bulb Pro which may include sensitive information such as network credentials.

CVSS3: 7.6
EPSS: Низкий
github логотип

GHSA-59p9-f7jg-cpj5

8 месяцев назад

During the initial setup of the device the user connects to an access point broadcast by the Sight Bulb Pro. During the negotiation, AES Encryption keys are passed in cleartext. If captured, an attacker may be able to decrypt communications between the management app and the Sight Bulb Pro which may include sensitive information such as network credentials.

CVSS3: 7.6
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2025-6521

During the initial setup of the device the user connects to an access point broadcast by the Sight Bulb Pro. During the negotiation, AES Encryption keys are passed in cleartext. If captured, an attacker may be able to decrypt communications between the management app and the Sight Bulb Pro which may include sensitive information such as network credentials.

CVSS3: 7.6
0%
Низкий
8 месяцев назад
github логотип
GHSA-59p9-f7jg-cpj5

During the initial setup of the device the user connects to an access point broadcast by the Sight Bulb Pro. During the negotiation, AES Encryption keys are passed in cleartext. If captured, an attacker may be able to decrypt communications between the management app and the Sight Bulb Pro which may include sensitive information such as network credentials.

CVSS3: 7.6
0%
Низкий
8 месяцев назад

Уязвимостей на страницу