ThroughTek's Kalay Platform 2.0 network allows an attacker to impersonate an arbitrary ThroughTek (TUTK) device given a valid 20-byte uniquely assigned identifier (UID). This could result in an attacker hijacking a victim's connection and forcing them into supplying credentials needed to access the victim TUTK device.
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-03T21:40:14.092Z
Reserved: 2021-03-13T00:00:00
Link: CVE-2021-28372

No data.

Status : Modified
Published: 2021-08-17T22:15:08.053
Modified: 2024-11-21T05:59:36.037
Link: CVE-2021-28372

No data.