A TLS vulnerability exists in the phone application used...
High severity
Unreviewed
Published
Aug 8, 2025
to the GitHub Advisory Database
•
Updated Aug 8, 2025
Description
Published by the National Vulnerability Database
Aug 8, 2025
Published to the GitHub Advisory Database
Aug 8, 2025
Last updated
Aug 8, 2025
A TLS vulnerability exists in the phone application used to manage a
connected device. The phone application accepts self-signed certificates
when establishing TLS communication which may result in
man-in-the-middle attacks on untrusted networks. Captured communications
may include user credentials and sensitive session tokens.
References