First published: Wed May 22 2024(Updated: )
TP-Link Tether versions prior to 4.5.13 and TP-Link Tapo versions prior to 3.3.6 do not properly validate certificates, which may allow a remote unauthenticated attacker to eavesdrop on an encrypted communication via a man-in-the-middle attack.
Credit: vultures@jpcert.or.jp
Affected Software | Affected Version | How to fix |
---|---|---|
TP-Link Tether | <4.5.13 | |
TP-Link Tapo | <3.3.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-31340 is classified as a high severity vulnerability due to its potential for man-in-the-middle attacks.
To mitigate CVE-2024-31340, update TP-Link Tether to version 4.5.13 or TP-Link Tapo to version 3.3.6 or later.
CVE-2024-31340 affects TP-Link Tether versions prior to 4.5.13 and TP-Link Tapo versions prior to 3.3.6.
Yes, CVE-2024-31340 can be exploited remotely by an unauthenticated attacker.
CVE-2024-31340 enables a man-in-the-middle attack, allowing an attacker to eavesdrop on encrypted communications.