TP-Link Tether versions prior to 4.5.13 and TP-Link Tapo versions prior to 3.3.6 do not properly validate certificates, which may allow a remote unauthenticated attacker to eavesdrop on an encrypted communication via a man-in-the-middle attack.
References
Configurations
No configuration.
History
28 Mar 2025, 20:15
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-295 |
21 Nov 2024, 09:13
Type | Values Removed | Values Added |
---|---|---|
References | () https://jvn.jp/en/jp/JVN29471697/ - | |
References | () https://play.google.com/store/apps/details?id=com.tplink.iot - | |
References | () https://play.google.com/store/apps/details?id=com.tplink.tether - |
03 Jul 2024, 01:54
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 4.8 |
Summary |
|
22 May 2024, 06:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-05-22 06:15
Updated : 2025-03-28 20:15
NVD link : CVE-2024-31340
Mitre link : CVE-2024-31340
CVE.ORG link : CVE-2024-31340
JSON object : View
Products Affected
No product.
CWE
CWE-295
Improper Certificate Validation