ThroughTek's Kalay Platform 2.0 network allows an attacker to impersonate an arbitrary ThroughTek (TUTK) device given a valid 20-byte uniquely assigned identifier (UID). This could result in an attacker hijacking a victim's connection and forcing them into supplying credentials needed to access the victim TUTK device.
References
Link | Resource |
---|---|
https://www.fireeye.com/blog/threat-research/2021/08/mandiant-discloses-critical-vulnerability-affecting-iot-devices.html | Exploit Mitigation Third Party Advisory |
https://www.throughtek.com/kalay_overview.html | Broken Link Vendor Advisory |
https://github.com/fireeye/Vulnerability-Disclosures/blob/master/FEYE-2021-0020/FEYE-2021-0020.md | Mitigation Third Party Advisory |
Configurations
Information
Published : 2021-08-17 15:15
Updated : 2021-08-18 06:45
NVD link : CVE-2021-28372
Mitre link : CVE-2021-28372
JSON object : View
CWE
CWE-290
Authentication Bypass by Spoofing
Products Affected
throughtek
- kalay_p2p_software_development_kit