First published: Tue Jun 06 2023(Updated: )
The AES Key-IV pair used by the TP-Link TAPO C200 camera V3 (EU) on firmware version 1.1.22 Build 220725 is reused across all cameras. An attacker with physical access to a camera is able to extract and decrypt sensitive data containing the Wifi password and the TP-LINK account credential of the victim.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Tp-link Tapo C200 Firmware | =1.2.2-build_220725 | |
TP-Link Tapo C200 | =3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-27126 is a vulnerability in the TP-Link TAPO C200 camera V3 (EU) on firmware version 1.1.22 Build 220725 where the AES Key-IV pair is reused across all cameras, allowing an attacker with physical access to extract and decrypt sensitive data.
CVE-2023-27126 has a severity level of 4.6 (medium).
CVE-2023-27126 affects the TP-Link TAPO C200 camera V3 (EU) on firmware version 1.1.22 Build 220725 by allowing an attacker with physical access to extract and decrypt sensitive data, including the WiFi password and TP-LINK account credentials.
To fix CVE-2023-27126, it is recommended to update the TP-Link TAPO C200 camera firmware to a version that addresses the vulnerability.
You can find more information about CVE-2023-27126 on the TP-Link website, the TAPO website, and a blog post by Claranet.