According to the researcher: "The TLS connections are encrypted against tampering or eavesdropping. However, the application does not validate the server certificate properly while initializing the TLS connection. This allows for a network attacker to intercept the connection and read the data. The attacker could the either send the client a malicious response, or forward the (possibly modified) data to the real server."
References
| Link | Resource |
|---|---|
| https://support.google.com/product-documentation/answer/14950962?sjid=9489879942601373169-NA | Vendor Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
Configuration 2 (hide)
| AND |
|
Configuration 3 (hide)
| AND |
|
Configuration 4 (hide)
| AND |
|
History
No history.
Information
Published : 2024-10-02 14:15
Updated : 2025-07-24 15:58
NVD link : CVE-2024-44097
Mitre link : CVE-2024-44097
CVE.ORG link : CVE-2024-44097
JSON object : View
Products Affected
- nest_cam_with_floodlight_firmware
- nest_cam_\(outdoor_or_indoor\,_battery\)
- nest_cam_with_floodlight
- nest_cam_\(indoor\,_wired\)
- nest_doorbell_\(battery\)_firmware
- nest_doorbell_\(battery\)
- nest_cam_\(indoor\,_wired\)_firmware
- nest_cam_\(outdoor_or_indoor\,_battery\)_firmware
CWE
CWE-269
Improper Privilege Management
