An issue in TPLink Smart Bulb Tapo series L530 before 1.2.4, L510E before 1.1.0, L630 before 1.0.4, P100 before 1.5.0, and Tapo Application 2.8.14 allows a remote attacker to replay old messages encrypted with a still valid session key.
References
Link | Resource |
---|---|
https://arxiv.org/abs/2308.09019 | Technical Description Third Party Advisory |
https://www.dmi.unict.it/giamp/smartbulbscanbehackedtohackintoyourhousehold/ | |
https://www.scitepress.org/Papers/2023/120929/120929.pdf | |
https://www.scitepress.org/PublicationsDetail.aspx?ID=X/auBv7JrSo=&t=1 | Third Party Advisory |
https://arxiv.org/abs/2308.09019 | Technical Description Third Party Advisory |
https://www.dmi.unict.it/giamp/smartbulbscanbehackedtohackintoyourhousehold/ | |
https://www.scitepress.org/Papers/2023/120929/120929.pdf | |
https://www.scitepress.org/PublicationsDetail.aspx?ID=X/auBv7JrSo=&t=1 | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2023-09-25 23:15
Updated : 2024-11-21 08:14
NVD link : CVE-2023-38907
Mitre link : CVE-2023-38907
CVE.ORG link : CVE-2023-38907
JSON object : View
Products Affected
tp-link
- tapo
- tapo_l530e
- tapo_l530e_firmware
CWE