The AES Key-IV pair used by the TP-Link TAPO C200 camera V3 (EU) on firmware version 1.1.22 Build 220725 is reused across all cameras. An attacker with physical access to a camera is able to extract and decrypt sensitive data containing the Wifi password and the TP-LINK account credential of the victim.
References
| Link | Resource |
|---|---|
| http://tapo.com | Product |
| http://tp-link.com | Product |
| https://www.claranet.fr/blog/dans-les-entrailles-dune-camera-connectee-tp-link-14 | Exploit Third Party Advisory |
| http://tapo.com | Product |
| http://tp-link.com | Product |
| https://www.claranet.fr/blog/dans-les-entrailles-dune-camera-connectee-tp-link-14 | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
History
21 Nov 2024, 07:52
| Type | Values Removed | Values Added |
|---|---|---|
| References | () http://tapo.com - Product | |
| References | () http://tp-link.com - Product | |
| References | () https://www.claranet.fr/blog/dans-les-entrailles-dune-camera-connectee-tp-link-14 - Exploit, Third Party Advisory |
12 Jun 2023, 16:28
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:h:tp-link:tapo_c200:3:*:*:*:*:*:*:* cpe:2.3:o:tp-link:tapo_c200_firmware:1.2.2:build_220725:*:*:*:*:*:* |
|
| References | (MISC) http://tp-link.com - Product | |
| References | (MISC) https://www.claranet.fr/blog/dans-les-entrailles-dune-camera-connectee-tp-link-14 - Exploit, Third Party Advisory | |
| References | (MISC) http://tapo.com - Product | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 4.6 |
| CWE | CWE-522 |
06 Jun 2023, 18:33
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2023-06-06 18:15
Updated : 2025-01-08 16:15
NVD link : CVE-2023-27126
Mitre link : CVE-2023-27126
CVE.ORG link : CVE-2023-27126
JSON object : View
Products Affected
tp-link
- tapo_c200
- tapo_c200_firmware
CWE
CWE-522
Insufficiently Protected Credentials
