ID CVE-2015-4080
Summary The Kankun Smart Socket device and mobile application uses a hardcoded AES 256 bit key, which makes it easier for remote attackers to (1) obtain sensitive information by sniffing the network and (2) obtain access to the device by encrypting messages.
References
Vulnerable Configurations
  • cpe:2.3:h:kankun:smartsocket:*:*:*:*:*:*:*:*
    cpe:2.3:h:kankun:smartsocket:*:*:*:*:*:*:*:*
CVSS
Base: 6.8 (as of 09-10-2018 - 19:57)
Impact:
Exploitability:
CWE CWE-310
CAPEC
  • Signature Spoofing by Key Recreation
    An attacker obtains an authoritative or reputable signer's private signature key by exploiting a cryptographic weakness in the signature algorithm or pseudorandom number generation and then uses this key to forge signatures from the original signer to mislead a victim into performing actions that benefit the attacker.
Access
VectorComplexityAuthentication
NETWORK MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:M/Au:N/C:P/I:P/A:P
refmap via4
bid 75057
bugtraq 20150606 Hardcoded AES 256 bit key used in Kankun IoT/Smart socket and its mobile App
misc
Last major update 09-10-2018 - 19:57
Published 09-06-2015 - 14:59
Last modified 09-10-2018 - 19:57
Back to Top