Description
Elemental Path's CogniToys Dino smart toys through firmware version 0.0.794 share a fixed small pool of hardcoded keys, allowing a remote attacker to use a different Dino device to decrypt VoIP traffic between a child's Dino and remote server.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2017-17808 | Elemental Path's CogniToys Dino smart toys through firmware version 0.0.794 share a fixed small pool of hardcoded keys, allowing a remote attacker to use a different Dino device to decrypt VoIP traffic between a child's Dino and remote server. |
References
| Link | Providers |
|---|---|
| https://dl.acm.org/citation.cfm?id=3139947 |
|
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T16:48:22.893Z
Reserved: 2017-05-09T00:00:00.000Z
Link: CVE-2017-8866
No data.
Status : Modified
Published: 2017-12-11T21:29:00.827
Modified: 2026-05-13T00:24:29.033
Link: CVE-2017-8866
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD