First published: Mon Sep 25 2023(Updated: )
An issue in TPLink Smart Bulb Tapo series L530 before 1.2.4, L510E before 1.1.0, L630 before 1.0.4, P100 before 1.5.0, and Tapo Application 2.8.14 allows a remote attacker to replay old messages encrypted with a still valid session key.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Tp-link Tapo L530e Firmware | =1.0.0 | |
Tp-link Tapo L530e | ||
Tp-link Tapo | =2.8.14 | |
All of | ||
Tp-link Tapo L530e Firmware | =1.0.0 | |
Tp-link Tapo L530e |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-38907 is an issue in TPLink Smart bulb Tapo series L530 v.1.0.0 and Tapo Application v.2.8.14 that allows a remote attacker to obtain sensitive information via session key in the message function.
CVE-2023-38907 affects TPLink Tapo L530e Firmware 1.0.0 by allowing a remote attacker to obtain sensitive information via session key in the message function.
CVE-2023-38907 affects TPLink Tapo Application 2.8.14 by allowing a remote attacker to obtain sensitive information via session key in the message function.
The severity of CVE-2023-38907 is high with a CVSS score of 7.5.
To fix CVE-2023-38907, it is recommended to update TPLink Smart bulb Tapo series L530 to the latest firmware version and Tapo Application to the latest version available.