ThroughTek Kalay SDK does not verify the authenticity of received messages, allowing an attacker to impersonate an authoritative server.
References
Link | Resource |
---|---|
https://bitdefender.com/blog/labs/notes-on-throughtek-kalay-vulnerabilities-and-their-impact/ | Exploit Third Party Advisory |
https://bitdefender.com/blog/labs/notes-on-throughtek-kalay-vulnerabilities-and-their-impact/ | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
|
History
11 Feb 2025, 21:32
Type | Values Removed | Values Added |
---|---|---|
References | () https://bitdefender.com/blog/labs/notes-on-throughtek-kalay-vulnerabilities-and-their-impact/ - Exploit, Third Party Advisory | |
CPE | cpe:2.3:h:owletcare:cam_2:-:*:*:*:*:*:*:* cpe:2.3:h:wyze:cam_v3:-:*:*:*:*:*:*:* cpe:2.3:h:roku:indoor_camera_se:-:*:*:*:*:*:*:* cpe:2.3:o:owletcare:cam_2_firmware:*:*:*:*:*:*:*:* cpe:2.3:a:throughtek:kalay_platform:-:*:*:*:*:*:*:* cpe:2.3:h:owletcare:cam:-:*:*:*:*:*:*:* cpe:2.3:o:owletcare:cam_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:roku:indoor_camera_se_firmware:3.0.2.4679:*:*:*:*:*:*:* cpe:2.3:o:wyze:cam_v3_firmware:4.36.11.5859:*:*:*:*:*:*:* |
|
First Time |
Roku indoor Camera Se
Owletcare cam 2 Wyze cam V3 Firmware Throughtek Roku indoor Camera Se Firmware Roku Wyze cam V3 Owletcare cam Wyze Owletcare cam 2 Firmware Owletcare Throughtek kalay Platform Owletcare cam Firmware |
Information
Published : 2024-05-15 13:15
Updated : 2025-02-11 21:32
NVD link : CVE-2023-6323
Mitre link : CVE-2023-6323
CVE.ORG link : CVE-2023-6323
JSON object : View
Products Affected
owletcare
- cam_2
- cam_2_firmware
- cam
- cam_firmware
roku
- indoor_camera_se_firmware
- indoor_camera_se
wyze
- cam_v3
- cam_v3_firmware
throughtek
- kalay_platform
CWE
CWE-345
Insufficient Verification of Data Authenticity