8.3
CVSSv3

CVE-2021-28372

Published: 17/08/2021 Updated: 18/08/2021
CVSS v2 Base Score: 7.6 | Impact Score: 10 | Exploitability Score: 4.9
CVSS v3 Base Score: 8.3 | Impact Score: 6 | Exploitability Score: 1.6
VMScore: 676
Vector: AV:N/AC:H/Au:N/C:C/I:C/A:C

Vulnerability Summary

ThroughTek's Kalay Platform 2.0 network allows an malicious user to impersonate an arbitrary ThroughTek (TUTK) device given a valid 20-byte uniquely assigned identifier (UID). This could result in an attacker hijacking a victim's connection and forcing them into supplying credentials needed to access the victim TUTK device.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

throughtek kalay p2p software development kit

Github Repositories

Mock Implementaion of the Vulnerable ThroughTek-Kalay MiTM Attack

Throughtek-Kalay-Mock-Attack OVERVIEW AUTHOR: Alexander Castro DESCRIPTION: Mock Implementaion of the Vulnerable ThroughTek-Kalay MiTM Attack PURPOSE: CYSE-580 Technical Demonstration REFERENCES NEWS: - thehackernewscom/2021/06/critical-throughtek-flaw-opens-millionshtml - awsplainenglishio/the-throughtek-kalay-vu