Vulnerability Details : CVE-2020-12702
Potential exploit
Weak encryption in the Quick Pairing mode in the eWeLink mobile application (Android application V4.9.2 and earlier, iOS application V4.9.1 and earlier) allows physically proximate attackers to eavesdrop on Wi-Fi credentials and other sensitive information by monitoring the Wi-Fi spectrum during the pairing process.
Products affected by CVE-2020-12702
- cpe:2.3:a:coolkit:ewelink:*:*:*:*:*:iphone_os:*:*
- cpe:2.3:a:coolkit:ewelink:*:*:*:*:*:android:*:*
Exploit prediction scoring system (EPSS) score for CVE-2020-12702
0.43%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 60 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2020-12702
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
2.1
|
LOW | AV:L/AC:L/Au:N/C:P/I:N/A:N |
3.9
|
2.9
|
NIST | |
4.6
|
MEDIUM | CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
0.9
|
3.6
|
NIST |
CWE ids for CVE-2020-12702
-
The product uses a broken or risky cryptographic algorithm or protocol.Assigned by: nvd@nist.gov (Primary)
References for CVE-2020-12702
-
https://www.youtube.com/watch?v=DghYH7WY6iE&feature=youtu.be
[CPSIoTSec20] A inSecure by Design IoT Protocol The ESP Touch Protocol and a Case Study - YouTubeExploit;Third Party Advisory
-
https://dl.acm.org/doi/abs/10.1145/3411498.3419965
A (in)Secure-by-Design IoT Protocol | Proceedings of the 2020 Joint Workshop on CPS&IoT Security and PrivacyThird Party Advisory
-
https://github.com/salgio/ESPTouchCatcher
GitHub - salgio/ESPTouchCatcher: eWeLinkESPT is a tool that automatically decodes and decrypts the WiFi network credentials transmitted to a supported ESP-based IoT device by the eWeLink mobile applicExploit;Third Party Advisory
-
https://play.google.com/store/apps/details?id=com.coolkit&hl=en_US
eWeLink - Smart Home - Apps on Google PlayProduct;Third Party Advisory
Jump to