During the initial setup of the device the user connects to an access
point broadcast by the Sight Bulb Pro. During the negotiation, AES
Encryption keys are passed in cleartext. If captured, an attacker may be
able to decrypt communications between the management app and the Sight
Bulb Pro which may include sensitive information such as network
credentials.
References
Configurations
No configuration.
History
30 Jun 2025, 18:38
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
27 Jun 2025, 17:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-06-27 17:15
Updated : 2025-06-30 18:38
NVD link : CVE-2025-6521
Mitre link : CVE-2025-6521
CVE.ORG link : CVE-2025-6521
JSON object : View
Products Affected
No product.
CWE
CWE-327
Use of a Broken or Risky Cryptographic Algorithm