MEDIUM · 4.3

CVE-2023-6323

ThroughTek Kalay SDK does not verify the authenticity of received messages, allowing an attacker to impersonate an authoritative server.

Vulnerability Description

ThroughTek Kalay SDK does not verify the authenticity of received messages, allowing an attacker to impersonate an authoritative server.

CVSS Score

4.3

MEDIUM

CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Attack Vector
ADJACENT_NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
LOW
Integrity
NONE
Availability
NONE

Affected Products

VendorProductVersions
WyzeCam V3 Firmware4.36.11.5859
WyzeCam V3-
RokuIndoor Camera Se Firmware3.0.2.4679
RokuIndoor Camera Se-
OwletcareCam Firmware< 4.2.11
OwletcareCam-
OwletcareCam 2 Firmware< 4.2.10
OwletcareCam 2-
ThroughtekKalay Platform-

Related Weaknesses (CWE)

References

FAQ

What is CVE-2023-6323?

CVE-2023-6323 is a vulnerability with a CVSS score of 4.3 (MEDIUM). ThroughTek Kalay SDK does not verify the authenticity of received messages, allowing an attacker to impersonate an authoritative server.

How severe is CVE-2023-6323?

CVE-2023-6323 has been rated MEDIUM with a CVSS base score of 4.3/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2023-6323?

Check the references section above for vendor advisories and patch information. Affected products include: Wyze Cam V3 Firmware, Wyze Cam V3, Roku Indoor Camera Se Firmware, Roku Indoor Camera Se, Owletcare Cam Firmware.