ThroughTek's Kalay Platform 2.0 network allows an attacker to impersonate an arbitrary ThroughTek (TUTK) device given a valid 20-byte uniquely assigned identifier (UID). This could result in an attacker hijacking a victim's connection and forcing them into supplying credentials needed to access the victim TUTK device.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: mitre
Published: 2021-08-17T21:48:35
Updated: 2024-08-03T21:40:14.092Z
Reserved: 2021-03-13T00:00:00
Link: CVE-2021-28372
Vulnrichment
No data.
NVD
Status : Modified
Published: 2021-08-17T22:15:08.053
Modified: 2024-11-21T05:59:36.037
Link: CVE-2021-28372
Redhat
No data.