CVE Vulnerabilities

CVE-2021-28372

Authentication Bypass by Spoofing

Published: Aug 17, 2021 | Modified: Aug 18, 2021
CVSS 3.x
8.3
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
CVSS 2.x
7.6 HIGH
AV:N/AC:H/Au:N/C:C/I:C/A:C
RedHat/V2
RedHat/V3
Ubuntu

ThroughTeks Kalay Platform 2.0 network allows an attacker to impersonate an arbitrary ThroughTek (TUTK) device given a valid 20-byte uniquely assigned identifier (UID). This could result in an attacker hijacking a victims connection and forcing them into supplying credentials needed to access the victim TUTK device.

Weakness

This attack-focused weakness is caused by incorrectly implemented authentication schemes that are subject to spoofing attacks.

Affected Software

Name Vendor Start Version End Version
Kalay_p2p_software_development_kit Throughtek * 3.1.10 (excluding)

References