{ "schema_version": "1.4.0", "id": "GHSA-h5gx-r98q-mqhf", "modified": "2022-05-24T19:11:38Z", "published": "2022-05-24T19:11:38Z", "aliases": [ "CVE-2021-28372" ], "details": "ThroughTek's Kalay Platform 2.0 network allows an attacker to impersonate an arbitrary ThroughTek (TUTK) device given a valid 20-byte uniquely assigned identifier (UID). This could result in an attacker hijacking a victim's connection and forcing them into supplying credentials needed to access the victim TUTK device.", "severity": [], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-28372" }, { "type": "WEB", "url": "https://github.com/fireeye/Vulnerability-Disclosures/blob/master/FEYE-2021-0020/FEYE-2021-0020.md" }, { "type": "WEB", "url": "https://www.fireeye.com/blog/threat-research/2021/08/mandiant-discloses-critical-vulnerability-affecting-iot-devices.html" }, { "type": "WEB", "url": "https://www.throughtek.com/kalay_overview.html" } ], "database_specific": { "cwe_ids": [ "CWE-290" ], "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2021-08-17T22:15:00Z" } }