CVE-2025-6521
BaseFortify
Publication date: 2025-06-27
Last updated on: 2025-06-30
Assigner: ICS-CERT
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-327 | The product uses a broken or risky cryptographic algorithm or protocol. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability occurs during the initial setup of the Sight Bulb Pro device when the user connects to its access point. During this connection negotiation, AES encryption keys are transmitted in cleartext, meaning they are not encrypted. If an attacker captures these keys, they can decrypt communications between the management app and the device, potentially accessing sensitive information such as network credentials.
How can this vulnerability impact me? :
If exploited, this vulnerability allows an attacker to intercept and decrypt communications between the management app and the Sight Bulb Pro device. This could lead to exposure of sensitive information like network credentials, which may compromise the security of your network and connected devices.