CVE-2025-6521

During the initial setup of the device the user connects to an access point broadcast by the Sight Bulb Pro. During the negotiation, AES Encryption keys are passed in cleartext. If captured, an attacker may be able to decrypt communications between the management app and the Sight Bulb Pro which may include sensitive information such as network credentials.
Configurations

No configuration.

History

30 Jun 2025, 18:38

Type Values Removed Values Added
Summary
  • (es) Durante la configuración inicial del dispositivo, el usuario se conecta a un punto de acceso transmitido por Sight Bulb Pro. Durante la negociación, las claves de cifrado AES se transmiten en texto plano. Si se capturan, un atacante podría descifrar las comunicaciones entre la aplicación de administración y Sight Bulb Pro, que pueden incluir información confidencial como las credenciales de red.

27 Jun 2025, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-06-27 17:15

Updated : 2025-06-30 18:38


NVD link : CVE-2025-6521

Mitre link : CVE-2025-6521

CVE.ORG link : CVE-2025-6521


JSON object : View

Products Affected

No product.

CWE
CWE-327

Use of a Broken or Risky Cryptographic Algorithm