First published: Tue Aug 22 2023(Updated: )
An issue in TPLink Smart Bulb Tapo series L530 before 1.2.4, L510E before 1.1.0, L630 before 1.0.4, P100 before 1.5.0, and Tapo Application 2.8.14 allows a remote attacker to obtain sensitive information via the IV component in the AES128-CBC function.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Tp-link Tapo | =2.8.14 | |
Tp-link Tapo L530e Firmware | =1.0.0 | |
Tp-link Tapo L530e | ||
All of | ||
Any of | ||
Tp-link Tapo | =2.8.14 | |
Tp-link Tapo L530e Firmware | =1.0.0 | |
Tp-link Tapo L530e |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-38909 has a severity level of medium.
CVE-2023-38909 affects TPLink Smart bulb Tapo series L530 v.1.0.0 and Tapo Application v.2.8.14.
A remote attacker can exploit CVE-2023-38909 to obtain sensitive information by exploiting the IV component in the AES128-CBC function.
No, Tp-link Tapo L530e is not affected by CVE-2023-38909.
Yes, you can find references for CVE-2023-38909 at the following links: [link1](https://arxiv.org/abs/2308.09019), [link2](https://arxiv.org/pdf/2308.09019.pdf), [link3](https://www.scitepress.org/PublicationsDetail.aspx?ID=X/auBv7JrSo=&t=1).