CVE-2023-6323

ThroughTek Kalay SDK does not verify the authenticity of received messages, allowing an attacker to impersonate an authoritative server.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:wyze:cam_v3_firmware:4.36.11.5859:*:*:*:*:*:*:*
cpe:2.3:h:wyze:cam_v3:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:roku:indoor_camera_se_firmware:3.0.2.4679:*:*:*:*:*:*:*
cpe:2.3:h:roku:indoor_camera_se:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:owletcare:cam_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:owletcare:cam:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:o:owletcare:cam_2_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:owletcare:cam_2:-:*:*:*:*:*:*:*

Configuration 5 (hide)

cpe:2.3:a:throughtek:kalay_platform:-:*:*:*:*:*:*:*

History

11 Feb 2025, 21:32

Type Values Removed Values Added
First Time Throughtek
Throughtek kalay Platform
Roku indoor Camera Se Firmware
Owletcare cam
Owletcare cam 2 Firmware
Roku indoor Camera Se
Wyze cam V3 Firmware
Roku
Wyze cam V3
Owletcare cam 2
Wyze
Owletcare
Owletcare cam Firmware
CPE cpe:2.3:o:owletcare:cam_2_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:owletcare:cam_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:roku:indoor_camera_se_firmware:3.0.2.4679:*:*:*:*:*:*:*
cpe:2.3:o:wyze:cam_v3_firmware:4.36.11.5859:*:*:*:*:*:*:*
cpe:2.3:h:owletcare:cam_2:-:*:*:*:*:*:*:*
cpe:2.3:h:wyze:cam_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:owletcare:cam:-:*:*:*:*:*:*:*
cpe:2.3:a:throughtek:kalay_platform:-:*:*:*:*:*:*:*
cpe:2.3:h:roku:indoor_camera_se:-:*:*:*:*:*:*:*
References () https://bitdefender.com/blog/labs/notes-on-throughtek-kalay-vulnerabilities-and-their-impact/ - () https://bitdefender.com/blog/labs/notes-on-throughtek-kalay-vulnerabilities-and-their-impact/ - Exploit, Third Party Advisory

21 Nov 2024, 08:43

Type Values Removed Values Added
Summary
  • (es) ThroughTek Kalay SDK no verifica la autenticidad de los mensajes recibidos, lo que permite a un atacante hacerse pasar por un servidor autorizado.
References () https://bitdefender.com/blog/labs/notes-on-throughtek-kalay-vulnerabilities-and-their-impact/ - () https://bitdefender.com/blog/labs/notes-on-throughtek-kalay-vulnerabilities-and-their-impact/ -

15 May 2024, 13:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-05-15 13:15

Updated : 2025-02-11 21:32


NVD link : CVE-2023-6323

Mitre link : CVE-2023-6323

CVE.ORG link : CVE-2023-6323


JSON object : View

Products Affected

owletcare

  • cam_2
  • cam
  • cam_2_firmware
  • cam_firmware

wyze

  • cam_v3_firmware
  • cam_v3

roku

  • indoor_camera_se
  • indoor_camera_se_firmware

throughtek

  • kalay_platform
CWE
CWE-345

Insufficient Verification of Data Authenticity