Free and open-source vulnerability scanner

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

CVE-2020-11445

CVE information

Published

4 years ago

Last Modified

2 years ago

CVSSv2.0 Severity

Medium

CVSSv3.1 Severity

Medium

Impact Analysis

Description

TP-Link cloud cameras through 2020-02-09 allow remote attackers to bypass authentication and obtain sensitive information via vectors involving a Wi-Fi session with GPS enabled, aka CNVD-2020-04855..

CVSSv2.0 Score

Severity
Medium
Base Score
5/10
Exploit Score
10/10
Access Vector
Network
Access Complexity
Low
Authentication Required
None
Impact Score
2.9/10
Confidentiality Impact
Partial
Availability Impact
None
Integrity Impact
None

CVSSv3.1 Score

Severity
Medium
Base Score
5.3/10
Exploit Score
3.9/10
Access Vector
Network
Access Complexity
Low
Privileges Required
None
Impact Score
1.4/10
Confidentiality Impact
Low
Availability Impact
None
Integrity Impact
None
Scope
Unchanged
User Interaction
None

Products Affected

CPE Affected Vulnerable Excluding Edit
cpe:2.3:o:tp-link:nc450_firmware:*:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:h:tp-link:nc450:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:o:tp-link:nc260_firmware:*:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:h:tp-link:nc260:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:o:tp-link:nc250_firmware:*:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:h:tp-link:nc250:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:o:tp-link:nc230_firmware:*:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:h:tp-link:nc230:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:o:tp-link:nc220_firmware:*:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:h:tp-link:nc220:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:o:tp-link:nc210_firmware:*:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:h:tp-link:nc210:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:o:tp-link:nc200_firmware:*:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:h:tp-link:nc200:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:o:tp-link:kc300s2_firmware:*:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:h:tp-link:kc300s2:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:o:tp-link:kc310s2_firmware:*:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:h:tp-link:kc310s2:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:o:tp-link:kc200_firmware:*:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:h:tp-link:kc200:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:o:tp-link:tapo_c200_firmware:*:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:h:tp-link:tapo_c200:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:o:tp-link:tapo_c100_firmware:*:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:h:tp-link:tapo_c100:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:o:tp-link:tl-sc3430_firmware:*:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:h:tp-link:tl-sc3430:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:o:tp-link:tl-sc3430n_firmware:*:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:h:tp-link:tl-sc3430n:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:o:tp-link:tl-sc4171g_firmware:*:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:h:tp-link:tl-sc4171g:-:*:*:*:*:*:*:*
  No
-