ThroughTek's Kalay Platform 2.0 network allows an attacker to impersonate an arbitrary ThroughTek (TUTK) device given a valid 20-byte uniquely assigned identifier (UID). This could result in an attacker hijacking a victim's connection and forcing them into supplying credentials needed to access the victim TUTK device.
                
            Metrics
Affected Vendors & Products
References
        History
                    No history.
 MITRE
                        MITRE
                    Status: PUBLISHED
Assigner: mitre
Published: 2021-08-17T21:48:35
Updated: 2024-08-03T21:40:14.092Z
Reserved: 2021-03-13T00:00:00
Link: CVE-2021-28372
 Vulnrichment
                        Vulnrichment
                    No data.
 NVD
                        NVD
                    Status : Modified
Published: 2021-08-17T22:15:08.053
Modified: 2024-11-21T05:59:36.037
Link: CVE-2021-28372
 Redhat
                        Redhat
                    No data.