Products
TP-Link Tapo P125M
- 1.0.3
Kasa KP125M
- 1.0.3
Source
cve@mitre.org
Tags
CVE-2024-46548 details
Published : Sept. 30, 2024, 5:15 p.m.
Last Modified : Sept. 30, 2024, 9:35 p.m.
Last Modified : Sept. 30, 2024, 9:35 p.m.
Description
TP-Link Tapo P125M and Kasa KP125M v1.0.3 was discovered to improperly validate certificates, allowing attackers to eavesdrop on communications and access sensitive information via a man-in-the-middle attack.
CVSS Score
1 | 2 | 3 | 4 | 5 | 6.3 | 7 | 8 | 9 | 10 |
---|
Weakness
Weakness | Name | Description |
---|---|---|
CWE-200 | Exposure of Sensitive Information to an Unauthorized Actor | The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. |
CVSS Data
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
LOW
Base Score
6.3
Exploitability Score
2.8
Impact Score
3.4
Base Severity
MEDIUM
Vector String : CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
References
URL | Source |
---|---|
https://github.com/Chapoly1305/tp-link-cve/blob/main/CVE-2024-46548.md | cve@mitre.org |
This website uses the NVD API, but is not approved or certified by it.