32 lines
1.2 KiB
JSON
Raw Normal View History

{
"id": "CVE-2024-31340",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2024-05-22T06:15:12.350",
"lastModified": "2024-05-22T12:46:53.887",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "TP-Link Tether versions prior to 4.5.13 and TP-Link Tapo versions prior to 3.3.6 do not properly validate certificates, which may allow a remote unauthenticated attacker to eavesdrop on an encrypted communication via a man-in-the-middle attack."
},
{
"lang": "es",
"value": "Las versiones de TP-Link Tether anteriores a 4.5.13 y las versiones de TP-Link Tapo anteriores a 3.3.6 no validan correctamente los certificados, lo que puede permitir que un atacante remoto no autenticado escuche a escondidas una comunicaci\u00f3n cifrada a trav\u00e9s de un ataque de intermediario."
}
],
"metrics": {},
"references": [
{
"url": "https://jvn.jp/en/jp/JVN29471697/",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://play.google.com/store/apps/details?id=com.tplink.iot",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://play.google.com/store/apps/details?id=com.tplink.tether",
"source": "vultures@jpcert.or.jp"
}
]
}