The affected ThroughTek P2P products (SDKs using versions before 3.1.5, any versions with nossl tag, device firmware not using AuthKey for IOTC conneciton, firmware using AVAPI module without enabling DTLS mechanism, and firmware using P2PTunnel or RDT module) do not sufficiently protect data transferred between the local device and ThroughTek servers. This can allow an attacker to access sensitive information, such as camera feeds.
References
Link | Resource |
---|---|
https://www.cisa.gov/uscert/ics/advisories/icsa-21-166-01 | Third Party Advisory US Government Resource |
https://www.cisa.gov/uscert/ics/advisories/icsa-21-166-01 | Third Party Advisory US Government Resource |
Configurations
History
21 Nov 2024, 06:07
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 5.0
v3 : 9.1 |
References | () https://www.cisa.gov/uscert/ics/advisories/icsa-21-166-01 - Third Party Advisory, US Government Resource |
Information
Published : 2022-05-19 18:15
Updated : 2024-11-21 06:07
NVD link : CVE-2021-32934
Mitre link : CVE-2021-32934
CVE.ORG link : CVE-2021-32934
JSON object : View
Products Affected
throughtek
- kalay_p2p_software_development_kit
CWE
CWE-319
Cleartext Transmission of Sensitive Information