CVE-2023-38907

An issue in TPLink Smart Bulb Tapo series L530 before 1.2.4, L510E before 1.1.0, L630 before 1.0.4, P100 before 1.5.0, and Tapo Application 2.8.14 allows a remote attacker to replay old messages encrypted with a still valid session key.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:tp-link:tapo_l530e_firmware:1.0.0:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:tapo_l530e:-:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:a:tp-link:tapo:2.8.14:*:*:*:*:*:*:*

History

21 Nov 2024, 08:14

Type Values Removed Values Added
References () https://arxiv.org/abs/2308.09019 - Technical Description, Third Party Advisory () https://arxiv.org/abs/2308.09019 - Technical Description, Third Party Advisory
References () https://www.dmi.unict.it/giamp/smartbulbscanbehackedtohackintoyourhousehold/ - () https://www.dmi.unict.it/giamp/smartbulbscanbehackedtohackintoyourhousehold/ -
References () https://www.scitepress.org/Papers/2023/120929/120929.pdf - () https://www.scitepress.org/Papers/2023/120929/120929.pdf -
References () https://www.scitepress.org/PublicationsDetail.aspx?ID=X/auBv7JrSo=&t=1 - Third Party Advisory () https://www.scitepress.org/PublicationsDetail.aspx?ID=X/auBv7JrSo=&t=1 - Third Party Advisory

07 May 2024, 15:15

Type Values Removed Values Added
References
  • () https://www.dmi.unict.it/giamp/smartbulbscanbehackedtohackintoyourhousehold/ -
Summary (en) An issue in TPLink Smart bulb Tapo series L530 v.1.0.0 and Tapo Application v.2.8.14 allows a remote attacker to obtain sensitive information via session key in the message function. (en) An issue in TPLink Smart Bulb Tapo series L530 before 1.2.4, L510E before 1.1.0, L630 before 1.0.4, P100 before 1.5.0, and Tapo Application 2.8.14 allows a remote attacker to replay old messages encrypted with a still valid session key.

19 Jan 2024, 20:15

Type Values Removed Values Added
References
  • () https://www.scitepress.org/Papers/2023/120929/120929.pdf -

26 Sep 2023, 17:34

Type Values Removed Values Added
First Time Tp-link tapo L530e
Tp-link tapo
Tp-link tapo L530e Firmware
Tp-link
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5
CPE cpe:2.3:o:tp-link:tapo_l530e_firmware:1.0.0:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:tapo_l530e:-:*:*:*:*:*:*:*
cpe:2.3:a:tp-link:tapo:2.8.14:*:*:*:*:*:*:*
References (MISC) https://arxiv.org/abs/2308.09019 - (MISC) https://arxiv.org/abs/2308.09019 - Technical Description, Third Party Advisory
References (MISC) https://www.scitepress.org/PublicationsDetail.aspx?ID=X/auBv7JrSo=&t=1 - (MISC) https://www.scitepress.org/PublicationsDetail.aspx?ID=X/auBv7JrSo=&t=1 - Third Party Advisory
CWE NVD-CWE-noinfo

25 Sep 2023, 23:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-09-25 23:15

Updated : 2024-11-21 08:14


NVD link : CVE-2023-38907

Mitre link : CVE-2023-38907

CVE.ORG link : CVE-2023-38907


JSON object : View

Products Affected

tp-link

  • tapo_l530e_firmware
  • tapo_l530e
  • tapo