First published: Thu Dec 28 2023(Updated: )
Incorrect access control in TP-Link Tapo before v3.1.315 allows attackers to access user credentials in plaintext.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Tp-link Tapo | <3.1.315 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-34829 has a critical severity rating due to incorrect access control allowing unauthorized access to sensitive user credentials.
To mitigate CVE-2023-34829, users should upgrade their TP-Link Tapo devices to version 3.1.315 or later.
CVE-2023-34829 affects all TP-Link Tapo devices running versions prior to 3.1.315.
CVE-2023-34829 allows attackers to access user credentials in plaintext, exposing sensitive account information.
Users can prevent exploitation of CVE-2023-34829 by regularly updating their device firmware and implementing strong access controls.