{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-35717","assignerOrgId":"99f1926a-a320-47d8-bbb5-42feb611262e","state":"PUBLISHED","assignerShortName":"zdi","dateReserved":"2023-06-15T20:23:02.752Z","datePublished":"2024-05-03T01:57:38.702Z","dateUpdated":"2024-09-18T18:28:52.945Z"},"containers":{"cna":{"providerMetadata":{"orgId":"99f1926a-a320-47d8-bbb5-42feb611262e","shortName":"zdi","dateUpdated":"2024-09-18T18:28:52.945Z"},"title":"TP-Link Tapo C210 Password Recovery Authentication Bypass Vulnerability","descriptions":[{"lang":"en","value":"TP-Link Tapo C210 Password Recovery Authentication Bypass Vulnerability. This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of TP-Link Tapo C210 IP cameras. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the password recovery mechanism. The issue results from reliance upon the secrecy of the password derivation algorithm when generating a recovery password. An attacker can leverage this vulnerability to bypass authentication on the system.\n. Was ZDI-CAN-20484."}],"affected":[{"vendor":"TP-Link","product":"Tapo C210","versions":[{"version":"1.3.0 Build 220830 Rel.69909n (release 2022-09-22)","status":"affected"}],"defaultStatus":"unknown"}],"problemTypes":[{"descriptions":[{"lang":"en","cweId":"CWE-640","description":"CWE-640: Weak Password Recovery Mechanism for Forgotten Password","type":"CWE"}]}],"references":[{"url":"https://www.zerodayinitiative.com/advisories/ZDI-23-895/","name":"ZDI-23-895","tags":["x_research-advisory"]}],"dateAssigned":"2023-06-15T20:31:13.910Z","datePublic":"2023-07-05T16:55:16.320Z","source":{"lang":"en","value":"Cyrille Chatras"},"metrics":[{"format":"CVSS","cvssV3_0":{"version":"3.0","vectorString":"CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH"}}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-07-18T13:26:17.142708Z","id":"CVE-2023-35717","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-07-18T13:26:26.400Z"}},{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T16:30:44.371Z"},"title":"CVE Program Container","references":[{"url":"https://www.zerodayinitiative.com/advisories/ZDI-23-895/","name":"ZDI-23-895","tags":["x_research-advisory","x_transferred"]}]}]}}