Vulnerabilites related to owletcare - cam_2_firmware
cve-2023-6323
Vulnerability from cvelistv5
Published
2024-05-15 12:08
Modified
2024-08-02 08:28
Summary
ThroughTek Kalay SDK does not verify the authenticity of received messages, allowing an attacker to impersonate an authoritative server.
Impacted products
Vendor Product Version
ThroughTek Kalay SDK Version: 0   < 4.3.4.2
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            affected: [
               {
                  cpes: [
                     "cpe:2.3:a:throughtek:kalay_sdk:*:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "kalay_sdk",
                  vendor: "throughtek",
                  versions: [
                     {
                        status: "affected",
                        version: "*",
                     },
                  ],
               },
            ],
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2023-6323",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-05-15T14:21:02.557530Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-06-04T17:17:09.423Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T08:28:21.783Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://bitdefender.com/blog/labs/notes-on-throughtek-kalay-vulnerabilities-and-their-impact/",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "unaffected",
               product: "Kalay SDK",
               vendor: "ThroughTek",
               versions: [
                  {
                     lessThan: "4.3.4.2",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
         ],
         credits: [
            {
               lang: "en",
               type: "finder",
               value: "Alexandru Lazar",
            },
            {
               lang: "en",
               type: "finder",
               value: "Radu Basaraba",
            },
         ],
         datePublic: "2024-05-15T12:00:00.000Z",
         descriptions: [
            {
               lang: "en",
               supportingMedia: [
                  {
                     base64: false,
                     type: "text/html",
                     value: "<div><div><p>ThroughTek Kalay SDK does not verify the authenticity of received messages, allowing an attacker to impersonate an authoritative server. </p></div></div>",
                  },
               ],
               value: "ThroughTek Kalay SDK does not verify the authenticity of received messages, allowing an attacker to impersonate an authoritative server.",
            },
         ],
         impacts: [
            {
               capecId: "CAPEC-151",
               descriptions: [
                  {
                     lang: "en",
                     value: "CAPEC-151 Identity Spoofing",
                  },
               ],
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "LOW",
                  attackVector: "ADJACENT_NETWORK",
                  availabilityImpact: "NONE",
                  baseScore: 4.3,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "LOW",
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-345",
                     description: "CWE-345 Insufficient Verification of Data Authenticity",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2024-05-15T12:08:57.397Z",
            orgId: "b3d5ebe7-963e-41fb-98e1-2edaeabb8f82",
            shortName: "Bitdefender",
         },
         references: [
            {
               url: "https://bitdefender.com/blog/labs/notes-on-throughtek-kalay-vulnerabilities-and-their-impact/",
            },
         ],
         source: {
            discovery: "UNKNOWN",
         },
         title: "ThroughTek Kalay SDK insufficient verification of message authenticity",
         x_generator: {
            engine: "Vulnogram 0.2.0",
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "b3d5ebe7-963e-41fb-98e1-2edaeabb8f82",
      assignerShortName: "Bitdefender",
      cveId: "CVE-2023-6323",
      datePublished: "2024-05-15T12:08:57.397Z",
      dateReserved: "2023-11-27T14:22:35.440Z",
      dateUpdated: "2024-08-02T08:28:21.783Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-6324
Vulnerability from cvelistv5
Published
2024-05-15 12:09
Modified
2024-08-02 08:28
Summary
ThroughTek Kalay SDK uses a predictable PSK value in the DTLS session when encountering an unexpected PSK identity
Impacted products
Vendor Product Version
ThroughTek Kalay SDK Version: 3.1.10.0   <
Version: 3.2.0.0   <
Version: 3.4.0.0   <
Version: 4.0.0.0   <
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            affected: [
               {
                  cpes: [
                     "cpe:2.3:a:throughtek:kalay_sdk:3.1.10.0:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "kalay_sdk",
                  vendor: "throughtek",
                  versions: [
                     {
                        status: "affected",
                        version: "3.1.10.0",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:a:throughtek:kalay_sdk:3.2.0.0:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "kalay_sdk",
                  vendor: "throughtek",
                  versions: [
                     {
                        status: "affected",
                        version: "3.2.0.0",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:a:throughtek:kalay_sdk:3.4.0.0:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "kalay_sdk",
                  vendor: "throughtek",
                  versions: [
                     {
                        status: "affected",
                        version: "3.4.0.0",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:a:throughtek:kalay_sdk:4.0.0.0:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "kalay_sdk",
                  vendor: "throughtek",
                  versions: [
                     {
                        status: "affected",
                        version: "4.0.0.0",
                     },
                  ],
               },
            ],
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2023-6324",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-05-15T16:02:56.677237Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-06-04T17:17:18.138Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T08:28:21.511Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://bitdefender.com/blog/labs/notes-on-throughtek-kalay-vulnerabilities-and-their-impact/",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "unaffected",
               product: "Kalay SDK",
               vendor: "ThroughTek",
               versions: [
                  {
                     lessThanOrEqual: "3.1.10.16",
                     status: "affected",
                     version: "3.1.10.0",
                     versionType: "custom",
                  },
                  {
                     lessThanOrEqual: "3.3.6.1",
                     status: "affected",
                     version: "3.2.0.0",
                     versionType: "custom",
                  },
                  {
                     lessThanOrEqual: "3.4.7.3",
                     status: "affected",
                     version: "3.4.0.0",
                     versionType: "custom",
                  },
                  {
                     lessThanOrEqual: "4.3.3.1",
                     status: "affected",
                     version: "4.0.0.0",
                     versionType: "custom",
                  },
               ],
            },
         ],
         credits: [
            {
               lang: "en",
               type: "finder",
               value: "Alexandru Lazar",
            },
            {
               lang: "en",
               type: "finder",
               value: "Radu Basaraba",
            },
         ],
         datePublic: "2024-05-15T12:00:00.000Z",
         descriptions: [
            {
               lang: "en",
               supportingMedia: [
                  {
                     base64: false,
                     type: "text/html",
                     value: "<div><div><p>ThroughTek Kalay SDK uses a predictable PSK value in the DTLS session when encountering an unexpected PSK identity </p></div></div>",
                  },
               ],
               value: "ThroughTek Kalay SDK uses a predictable PSK value in the DTLS session when encountering an unexpected PSK identity",
            },
         ],
         impacts: [
            {
               capecId: "CAPEC-153",
               descriptions: [
                  {
                     lang: "en",
                     value: "CAPEC-153 Input Data Manipulation",
                  },
               ],
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "NONE",
                  baseScore: 8.1,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "HIGH",
                  integrityImpact: "HIGH",
                  privilegesRequired: "LOW",
                  scope: "UNCHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-457",
                     description: "CWE-457 Use of Uninitialized Variable",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2024-05-15T12:09:29.682Z",
            orgId: "b3d5ebe7-963e-41fb-98e1-2edaeabb8f82",
            shortName: "Bitdefender",
         },
         references: [
            {
               url: "https://bitdefender.com/blog/labs/notes-on-throughtek-kalay-vulnerabilities-and-their-impact/",
            },
         ],
         source: {
            discovery: "UNKNOWN",
         },
         title: "ThroughTek Kalay SDK error in handling the PSK identity",
         x_generator: {
            engine: "Vulnogram 0.2.0",
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "b3d5ebe7-963e-41fb-98e1-2edaeabb8f82",
      assignerShortName: "Bitdefender",
      cveId: "CVE-2023-6324",
      datePublished: "2024-05-15T12:09:29.682Z",
      dateReserved: "2023-11-27T14:22:36.362Z",
      dateUpdated: "2024-08-02T08:28:21.511Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-6321
Vulnerability from cvelistv5
Published
2024-05-15 12:07
Modified
2024-08-02 08:28
Summary
A command injection vulnerability exists in the IOCTL that manages OTA updates. A specially crafted command can lead to command execution as the root user. An attacker can make authenticated requests to trigger this vulnerability.
Impacted products
Vendor Product Version
Owlet Cam v2 Version: 0   < 4.2.10
Create a notification for this product.
   Owlet Cam v1 Version: 0   < 4.2.11
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            affected: [
               {
                  cpes: [
                     "cpe:2.3:a:owlet:cam_v2:*:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "cam_v2",
                  vendor: "owlet",
                  versions: [
                     {
                        lessThan: "4.2.10",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:a:owlet:cam_v1:*:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "cam_v1",
                  vendor: "owlet",
                  versions: [
                     {
                        lessThan: "4.2.11",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
            ],
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2023-6321",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-05-15T15:37:34.617442Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-06-06T13:04:03.509Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T08:28:21.329Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://bitdefender.com/blog/labs/notes-on-throughtek-kalay-vulnerabilities-and-their-impact/",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "unaffected",
               product: "Cam v2",
               vendor: "Owlet",
               versions: [
                  {
                     lessThan: "4.2.10",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
            {
               defaultStatus: "unaffected",
               product: "Cam v1",
               vendor: "Owlet",
               versions: [
                  {
                     lessThan: "4.2.11",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
         ],
         credits: [
            {
               lang: "en",
               type: "finder",
               value: "Alexandru Lazar",
            },
            {
               lang: "en",
               type: "finder",
               value: "Radu Basaraba",
            },
         ],
         datePublic: "2024-05-15T12:00:00.000Z",
         descriptions: [
            {
               lang: "en",
               supportingMedia: [
                  {
                     base64: false,
                     type: "text/html",
                     value: "<div><div><p>A command injection vulnerability exists in the IOCTL that manages OTA updates. A specially crafted command can lead to command execution as the root user. An attacker can make authenticated requests to trigger this vulnerability. </p></div></div>",
                  },
               ],
               value: "A command injection vulnerability exists in the IOCTL that manages OTA updates. A specially crafted command can lead to command execution as the root user. An attacker can make authenticated requests to trigger this vulnerability.",
            },
         ],
         impacts: [
            {
               capecId: "CAPEC-88",
               descriptions: [
                  {
                     lang: "en",
                     value: "CAPEC-88 OS Command Injection",
                  },
               ],
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "HIGH",
                  baseScore: 7.2,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "HIGH",
                  integrityImpact: "HIGH",
                  privilegesRequired: "HIGH",
                  scope: "UNCHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-78",
                     description: "CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2024-05-15T12:07:44.554Z",
            orgId: "b3d5ebe7-963e-41fb-98e1-2edaeabb8f82",
            shortName: "Bitdefender",
         },
         references: [
            {
               url: "https://bitdefender.com/blog/labs/notes-on-throughtek-kalay-vulnerabilities-and-their-impact/",
            },
         ],
         source: {
            discovery: "UNKNOWN",
         },
         title: "Owlet Camera OS command injection",
         x_generator: {
            engine: "Vulnogram 0.1.0-dev",
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "b3d5ebe7-963e-41fb-98e1-2edaeabb8f82",
      assignerShortName: "Bitdefender",
      cveId: "CVE-2023-6321",
      datePublished: "2024-05-15T12:07:44.554Z",
      dateReserved: "2023-11-27T14:22:33.541Z",
      dateUpdated: "2024-08-02T08:28:21.329Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

Vulnerability from fkie_nvd
Published
2024-05-15 13:15
Modified
2025-02-11 21:32
Summary
ThroughTek Kalay SDK uses a predictable PSK value in the DTLS session when encountering an unexpected PSK identity



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:wyze:cam_v3_firmware:4.36.11.5859:*:*:*:*:*:*:*",
                     matchCriteriaId: "4FE4DD58-8A90-43ED-B613-AB7D0BBA63A4",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:wyze:cam_v3:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C96BD4E4-F38A-4D78-851D-0F879B4D3A16",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:roku:indoor_camera_se_firmware:3.0.2.4679:*:*:*:*:*:*:*",
                     matchCriteriaId: "B79DA37F-D435-470A-812C-5DB730F91A85",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:roku:indoor_camera_se:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EF28236D-4618-4E8A-A8A5-60DD6104D9CD",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:owletcare:cam_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "9C11F124-BEE1-4FAF-9BD6-CA0BC81AF56C",
                     versionEndExcluding: "4.2.11",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:owletcare:cam:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F8A54D2C-9F78-4B06-B5CD-3DBE54F031BF",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:owletcare:cam_2_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "167A51A1-6B23-45B2-9038-A8A65966EB83",
                     versionEndExcluding: "4.2.10",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:owletcare:cam_2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D9E25B26-657F-4953-B06E-E70F9D397888",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:throughtek:kalay_platform:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4176E066-18DF-47D7-8604-2596C2F37EB6",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "ThroughTek Kalay SDK uses a predictable PSK value in the DTLS session when encountering an unexpected PSK identity",
      },
      {
         lang: "es",
         value: "ThroughTek Kalay SDK utiliza un valor PSK predecible en la sesión DTLS cuando encuentra una identidad PSK inesperada",
      },
   ],
   id: "CVE-2023-6324",
   lastModified: "2025-02-11T21:32:50.220",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 8.1,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
               version: "3.1",
            },
            exploitabilityScore: 2.8,
            impactScore: 5.2,
            source: "cve-requests@bitdefender.com",
            type: "Secondary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 8.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 2.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2024-05-15T13:15:26.010",
   references: [
      {
         source: "cve-requests@bitdefender.com",
         tags: [
            "Exploit",
            "Third Party Advisory",
         ],
         url: "https://bitdefender.com/blog/labs/notes-on-throughtek-kalay-vulnerabilities-and-their-impact/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
            "Third Party Advisory",
         ],
         url: "https://bitdefender.com/blog/labs/notes-on-throughtek-kalay-vulnerabilities-and-their-impact/",
      },
   ],
   sourceIdentifier: "cve-requests@bitdefender.com",
   vulnStatus: "Analyzed",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-457",
            },
         ],
         source: "cve-requests@bitdefender.com",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-908",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2024-05-15 13:15
Modified
2025-02-11 21:32
Summary
A command injection vulnerability exists in the IOCTL that manages OTA updates. A specially crafted command can lead to command execution as the root user. An attacker can make authenticated requests to trigger this vulnerability.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:owletcare:cam_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "9C11F124-BEE1-4FAF-9BD6-CA0BC81AF56C",
                     versionEndExcluding: "4.2.11",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:owletcare:cam:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F8A54D2C-9F78-4B06-B5CD-3DBE54F031BF",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:owletcare:cam_2_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "167A51A1-6B23-45B2-9038-A8A65966EB83",
                     versionEndExcluding: "4.2.10",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:owletcare:cam_2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D9E25B26-657F-4953-B06E-E70F9D397888",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:throughtek:kalay_platform:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4176E066-18DF-47D7-8604-2596C2F37EB6",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "A command injection vulnerability exists in the IOCTL that manages OTA updates. A specially crafted command can lead to command execution as the root user. An attacker can make authenticated requests to trigger this vulnerability.",
      },
      {
         lang: "es",
         value: "Existe una vulnerabilidad de inyección de comandos en el IOCTL que administra las actualizaciones OTA. Un comando especialmente manipulado puede llevar a la ejecución del comando como usuario root. Un atacante puede realizar solicitudes autenticadas para desencadenar esta vulnerabilidad.",
      },
   ],
   id: "CVE-2023-6321",
   lastModified: "2025-02-11T21:32:39.830",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.2,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.2,
            impactScore: 5.9,
            source: "cve-requests@bitdefender.com",
            type: "Secondary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 8.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 2.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2024-05-15T13:15:25.230",
   references: [
      {
         source: "cve-requests@bitdefender.com",
         tags: [
            "Exploit",
            "Third Party Advisory",
         ],
         url: "https://bitdefender.com/blog/labs/notes-on-throughtek-kalay-vulnerabilities-and-their-impact/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
            "Third Party Advisory",
         ],
         url: "https://bitdefender.com/blog/labs/notes-on-throughtek-kalay-vulnerabilities-and-their-impact/",
      },
   ],
   sourceIdentifier: "cve-requests@bitdefender.com",
   vulnStatus: "Analyzed",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-78",
            },
         ],
         source: "cve-requests@bitdefender.com",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-77",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2024-05-15 13:15
Modified
2025-02-11 21:32
Summary
ThroughTek Kalay SDK does not verify the authenticity of received messages, allowing an attacker to impersonate an authoritative server.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:wyze:cam_v3_firmware:4.36.11.5859:*:*:*:*:*:*:*",
                     matchCriteriaId: "4FE4DD58-8A90-43ED-B613-AB7D0BBA63A4",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:wyze:cam_v3:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C96BD4E4-F38A-4D78-851D-0F879B4D3A16",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:roku:indoor_camera_se_firmware:3.0.2.4679:*:*:*:*:*:*:*",
                     matchCriteriaId: "B79DA37F-D435-470A-812C-5DB730F91A85",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:roku:indoor_camera_se:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EF28236D-4618-4E8A-A8A5-60DD6104D9CD",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:owletcare:cam_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "9C11F124-BEE1-4FAF-9BD6-CA0BC81AF56C",
                     versionEndExcluding: "4.2.11",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:owletcare:cam:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F8A54D2C-9F78-4B06-B5CD-3DBE54F031BF",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:owletcare:cam_2_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "167A51A1-6B23-45B2-9038-A8A65966EB83",
                     versionEndExcluding: "4.2.10",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:owletcare:cam_2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D9E25B26-657F-4953-B06E-E70F9D397888",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:throughtek:kalay_platform:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4176E066-18DF-47D7-8604-2596C2F37EB6",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "ThroughTek Kalay SDK does not verify the authenticity of received messages, allowing an attacker to impersonate an authoritative server.",
      },
      {
         lang: "es",
         value: "ThroughTek Kalay SDK no verifica la autenticidad de los mensajes recibidos, lo que permite a un atacante hacerse pasar por un servidor autorizado.",
      },
   ],
   id: "CVE-2023-6323",
   lastModified: "2025-02-11T21:32:45.037",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "ADJACENT_NETWORK",
               availabilityImpact: "NONE",
               baseScore: 4.3,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "LOW",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 2.8,
            impactScore: 1.4,
            source: "cve-requests@bitdefender.com",
            type: "Secondary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "ADJACENT_NETWORK",
               availabilityImpact: "NONE",
               baseScore: 6.5,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 2.8,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2024-05-15T13:15:25.780",
   references: [
      {
         source: "cve-requests@bitdefender.com",
         tags: [
            "Exploit",
            "Third Party Advisory",
         ],
         url: "https://bitdefender.com/blog/labs/notes-on-throughtek-kalay-vulnerabilities-and-their-impact/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
            "Third Party Advisory",
         ],
         url: "https://bitdefender.com/blog/labs/notes-on-throughtek-kalay-vulnerabilities-and-their-impact/",
      },
   ],
   sourceIdentifier: "cve-requests@bitdefender.com",
   vulnStatus: "Analyzed",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-345",
            },
         ],
         source: "cve-requests@bitdefender.com",
         type: "Secondary",
      },
   ],
}