TP-Link Tapo C210 Password Recovery Authentication Bypass Vulnerability. This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of TP-Link Tapo C210 IP cameras. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the password recovery mechanism. The issue results from reliance upon the secrecy of the password derivation algorithm when generating a recovery password. An attacker can leverage this vulnerability to bypass authentication on the system.
. Was ZDI-CAN-20484.
References
Link | Resource |
---|---|
https://www.zerodayinitiative.com/advisories/ZDI-23-895/ |
Configurations
No configuration.
History
18 Sep 2024, 19:15
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
Summary | (en) TP-Link Tapo C210 Password Recovery Authentication Bypass Vulnerability. This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of TP-Link Tapo C210 IP cameras. Authentication is not required to exploit this vulnerability. The specific flaw exists within the password recovery mechanism. The issue results from reliance upon the secrecy of the password derivation algorithm when generating a recovery password. An attacker can leverage this vulnerability to bypass authentication on the system. . Was ZDI-CAN-20484. |
03 May 2024, 02:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-05-03 02:15
Updated : 2024-09-18 19:15
NVD link : CVE-2023-35717
Mitre link : CVE-2023-35717
CVE.ORG link : CVE-2023-35717
JSON object : View
Products Affected
No product.
CWE
CWE-640
Weak Password Recovery Mechanism for Forgotten Password