CVE-2021-28372

ThroughTek's Kalay Platform 2.0 network allows an attacker to impersonate an arbitrary ThroughTek (TUTK) device given a valid 20-byte uniquely assigned identifier (UID). This could result in an attacker hijacking a victim's connection and forcing them into supplying credentials needed to access the victim TUTK device.
Configurations

Configuration 1 (hide)

cpe:2.3:a:throughtek:kalay_p2p_software_development_kit:*:*:*:*:*:*:*:*

History

21 Nov 2024, 05:59

Type Values Removed Values Added
References () https://github.com/fireeye/Vulnerability-Disclosures/blob/master/FEYE-2021-0020/FEYE-2021-0020.md - Mitigation, Third Party Advisory () https://github.com/fireeye/Vulnerability-Disclosures/blob/master/FEYE-2021-0020/FEYE-2021-0020.md - Mitigation, Third Party Advisory
References () https://www.fireeye.com/blog/threat-research/2021/08/mandiant-discloses-critical-vulnerability-affecting-iot-devices.html - Exploit, Mitigation, Third Party Advisory () https://www.fireeye.com/blog/threat-research/2021/08/mandiant-discloses-critical-vulnerability-affecting-iot-devices.html - Exploit, Mitigation, Third Party Advisory
References () https://www.throughtek.com/kalay_overview.html - Broken Link, Vendor Advisory () https://www.throughtek.com/kalay_overview.html - Broken Link, Vendor Advisory

Information

Published : 2021-08-17 22:15

Updated : 2024-11-21 05:59


NVD link : CVE-2021-28372

Mitre link : CVE-2021-28372

CVE.ORG link : CVE-2021-28372


JSON object : View

Products Affected

throughtek

  • kalay_p2p_software_development_kit
CWE
CWE-290

Authentication Bypass by Spoofing