An exploitable information disclosure vulnerability exists in the Weave PASE pairing functionality of the Nest Cam IQ Indoor, version 4620002. A set of specially crafted weave packets can brute force a pairing code, resulting in greater Weave access and potentially full device control. An attacker can send specially crafted packets to trigger this vulnerability.
The product does not implement sufficient measures to prevent multiple failed authentication attempts within a short time frame.
The product uses a broken or risky cryptographic algorithm or protocol.
Link | Tags |
---|---|
https://talosintelligence.com/vulnerability_reports/TALOS-2019-0798 | third party advisory exploit |