ThroughTek's Kalay Platform 2.0 network allows an attacker to impersonate an arbitrary ThroughTek (TUTK) device given a valid 20-byte uniquely assigned identifier (UID). This could result in an attacker hijacking a victim's connection and forcing them into supplying credentials needed to access the victim TUTK device.
References
Link | Resource |
---|---|
https://github.com/fireeye/Vulnerability-Disclosures/blob/master/FEYE-2021-0020/FEYE-2021-0020.md | Mitigation Third Party Advisory |
https://www.fireeye.com/blog/threat-research/2021/08/mandiant-discloses-critical-vulnerability-affecting-iot-devices.html | Exploit Mitigation Third Party Advisory |
https://www.throughtek.com/kalay_overview.html | Broken Link Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2021-08-17T21:48:35
Updated: 2021-08-17T21:48:35
Reserved: 2021-03-13T00:00:00
Link: CVE-2021-28372
JSON object: View
NVD Information
Status : Analyzed
Published: 2021-08-17T22:15:08.053
Modified: 2021-08-18T13:45:09.773
Link: CVE-2021-28372
JSON object: View
Redhat Information
No data.
CWE