Description
SSL Pinning Bypass in eWeLink Some hardware products allows local ATTACKER to Decrypt TLS communication and Extract secrets to clone the device via Flash the modified firmware
Published: 2024-10-08
Score: 7 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

Vendor Solution

Upgrade to firmware 2.1.0 and above

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2024-48174 SSL Pinning Bypass in eWeLink Some hardware products allows local ATTACKER to Decrypt TLS communication and Extract secrets to clone the device via Flash the modified firmware
History

Tue, 08 Oct 2024 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 08 Oct 2024 06:30:00 +0000

Type Values Removed Values Added
Description SSL Pinning Bypass in eWeLink Some hardware products allows local ATTACKER to Decrypt TLS communication and Extract secrets to clone the device via Flash the modified firmware
Title Firmware extraction and Hardware SSL Pinning Bypass
Weaknesses CWE-295
CWE-798
References
Metrics cvssV4_0

{'score': 7, 'vector': 'CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: CoolKit

Published:

Updated: 2024-10-08T18:40:56.566Z

Reserved: 2024-07-29T11:11:26.910Z

Link: CVE-2024-7206

cve-icon Vulnrichment

Updated: 2024-10-08T18:40:48.556Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-10-08T07:15:06.170

Modified: 2024-10-10T12:56:30.817

Link: CVE-2024-7206

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses