An issue in TPLink Smart Bulb Tapo series L530 before 1.2.4, L510E before 1.1.0, L630 before 1.0.4, P100 before 1.5.0, and Tapo Application 2.8.14 allows a remote attacker to replay old messages encrypted with a still valid session key.
References
Link | Resource |
---|---|
https://arxiv.org/abs/2308.09019 | Technical Description Third Party Advisory |
https://www.dmi.unict.it/giamp/smartbulbscanbehackedtohackintoyourhousehold/ | |
https://www.scitepress.org/Papers/2023/120929/120929.pdf | |
https://www.scitepress.org/PublicationsDetail.aspx?ID=X/auBv7JrSo=&t=1 | Third Party Advisory |
https://arxiv.org/abs/2308.09019 | Technical Description Third Party Advisory |
https://www.dmi.unict.it/giamp/smartbulbscanbehackedtohackintoyourhousehold/ | |
https://www.scitepress.org/Papers/2023/120929/120929.pdf | |
https://www.scitepress.org/PublicationsDetail.aspx?ID=X/auBv7JrSo=&t=1 | Third Party Advisory |
Configurations
History
21 Nov 2024, 08:14
Type | Values Removed | Values Added |
---|---|---|
References | () https://arxiv.org/abs/2308.09019 - Technical Description, Third Party Advisory | |
References | () https://www.dmi.unict.it/giamp/smartbulbscanbehackedtohackintoyourhousehold/ - | |
References | () https://www.scitepress.org/Papers/2023/120929/120929.pdf - | |
References | () https://www.scitepress.org/PublicationsDetail.aspx?ID=X/auBv7JrSo=&t=1 - Third Party Advisory |
07 May 2024, 15:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Summary | (en) An issue in TPLink Smart Bulb Tapo series L530 before 1.2.4, L510E before 1.1.0, L630 before 1.0.4, P100 before 1.5.0, and Tapo Application 2.8.14 allows a remote attacker to replay old messages encrypted with a still valid session key. |
19 Jan 2024, 20:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
26 Sep 2023, 17:34
Type | Values Removed | Values Added |
---|---|---|
First Time |
Tp-link tapo L530e
Tp-link tapo Tp-link tapo L530e Firmware Tp-link |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
CPE | cpe:2.3:o:tp-link:tapo_l530e_firmware:1.0.0:*:*:*:*:*:*:* cpe:2.3:h:tp-link:tapo_l530e:-:*:*:*:*:*:*:* cpe:2.3:a:tp-link:tapo:2.8.14:*:*:*:*:*:*:* |
|
References | (MISC) https://arxiv.org/abs/2308.09019 - Technical Description, Third Party Advisory | |
References | (MISC) https://www.scitepress.org/PublicationsDetail.aspx?ID=X/auBv7JrSo=&t=1 - Third Party Advisory | |
CWE | NVD-CWE-noinfo |
25 Sep 2023, 23:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-09-25 23:15
Updated : 2024-11-21 08:14
NVD link : CVE-2023-38907
Mitre link : CVE-2023-38907
CVE.ORG link : CVE-2023-38907
JSON object : View
Products Affected
tp-link
- tapo_l530e_firmware
- tapo_l530e
- tapo
CWE