ThroughTeks Kalay Platform 2.0 network allows an attacker to impersonate an arbitrary ThroughTek (TUTK) device given a valid 20-byte uniquely assigned identifier (UID). This could result in an attacker hijacking a victims connection and forcing them into supplying credentials needed to access the victim TUTK device.
This attack-focused weakness is caused by incorrectly implemented authentication schemes that are subject to spoofing attacks.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Kalay_p2p_software_development_kit | Throughtek | * | 3.1.10 (excluding) |