CVE-2023-27126

The AES Key-IV pair used by the TP-Link TAPO C200 camera V3 (EU) on firmware version 1.1.22 Build 220725 is reused across all cameras. An attacker with physical access to a camera is able to extract and decrypt sensitive data containing the Wifi password and the TP-LINK account credential of the victim.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:tp-link:tapo_c200_firmware:1.2.2:build_220725:*:*:*:*:*:*
cpe:2.3:h:tp-link:tapo_c200:3:*:*:*:*:*:*:*

History

21 Nov 2024, 07:52

Type Values Removed Values Added
References () http://tapo.com - Product () http://tapo.com - Product
References () http://tp-link.com - Product () http://tp-link.com - Product
References () https://www.claranet.fr/blog/dans-les-entrailles-dune-camera-connectee-tp-link-14 - Exploit, Third Party Advisory () https://www.claranet.fr/blog/dans-les-entrailles-dune-camera-connectee-tp-link-14 - Exploit, Third Party Advisory

12 Jun 2023, 16:28

Type Values Removed Values Added
CPE cpe:2.3:o:tp-link:tapo_c200_firmware:1.2.2:build_220725:*:*:*:*:*:*
cpe:2.3:h:tp-link:tapo_c200:3:*:*:*:*:*:*:*
CWE CWE-522
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 4.6
References (MISC) https://www.claranet.fr/blog/dans-les-entrailles-dune-camera-connectee-tp-link-14 - (MISC) https://www.claranet.fr/blog/dans-les-entrailles-dune-camera-connectee-tp-link-14 - Exploit, Third Party Advisory
References (MISC) http://tapo.com - (MISC) http://tapo.com - Product
References (MISC) http://tp-link.com - (MISC) http://tp-link.com - Product
First Time Tp-link
Tp-link tapo C200 Firmware
Tp-link tapo C200

06 Jun 2023, 18:33

Type Values Removed Values Added
New CVE

Information

Published : 2023-06-06 18:15

Updated : 2024-11-21 07:52


NVD link : CVE-2023-27126

Mitre link : CVE-2023-27126

CVE.ORG link : CVE-2023-27126


JSON object : View

Products Affected

tp-link

  • tapo_c200_firmware
  • tapo_c200
CWE
CWE-522

Insufficiently Protected Credentials