Vulnerability Description
TP-Link Tether versions prior to 4.5.13 and TP-Link Tapo versions prior to 3.3.6 do not properly validate certificates, which may allow a remote unauthenticated attacker to eavesdrop on an encrypted communication via a man-in-the-middle attack.
CVSS Score
MEDIUM
Related Weaknesses (CWE)
References
- https://jvn.jp/en/jp/JVN29471697/
- https://play.google.com/store/apps/details?id=com.tplink.iot
- https://play.google.com/store/apps/details?id=com.tplink.tether
- https://jvn.jp/en/jp/JVN29471697/
- https://play.google.com/store/apps/details?id=com.tplink.iot
- https://play.google.com/store/apps/details?id=com.tplink.tether
FAQ
What is CVE-2024-31340?
CVE-2024-31340 is a vulnerability with a CVSS score of 4.8 (MEDIUM). TP-Link Tether versions prior to 4.5.13 and TP-Link Tapo versions prior to 3.3.6 do not properly validate certificates, which may allow a remote unauthenticated attacker to eavesdrop on an encrypted c...
How severe is CVE-2024-31340?
CVE-2024-31340 has been rated MEDIUM with a CVSS base score of 4.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-31340?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.