CVE-2020-12110

9.8 CRITICAL

📋 TL;DR

This vulnerability affects multiple TP-Link cloud camera models that use a hardcoded encryption key for communication. Attackers can decrypt sensitive data and potentially gain unauthorized access to camera feeds and device control. All users of the specified TP-Link camera models with vulnerable firmware versions are affected.

💻 Affected Systems

Products:
  • TP-Link NC200
  • TP-Link N210
  • TP-Link NC220
  • TP-Link NC230
  • TP-Link NC250
  • TP-Link NC260
  • TP-Link NC450
Versions: NC200: 2.1.9 build 200225, N210: 1.0.9 build 200304, NC220: 1.3.0 build 200304, NC230: 1.3.0 build 200304, NC250: 1.3.0 build 200304, NC260: 1.5.2 build 200304, NC450: 1.5.3 build 200304
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: All devices with default configurations using cloud connectivity are vulnerable. Local-only configurations may reduce exposure.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of camera systems allowing attackers to view live feeds, manipulate recordings, disable cameras, pivot to internal networks, and maintain persistent access.

🟠

Likely Case

Unauthorized access to camera feeds, potential privacy violations, and ability to disable security monitoring.

🟢

If Mitigated

Limited impact if cameras are isolated on separate VLANs without internet access and proper network segmentation.

🌐 Internet-Facing: HIGH - Cloud-connected cameras with hardcoded keys allow remote attackers to intercept and decrypt communications.
🏢 Internal Only: MEDIUM - Attackers with internal network access could exploit this, but requires network foothold first.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Hardcoded key means attackers only need to intercept encrypted traffic and apply the known key. Public exploit details available in referenced disclosures.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check TP-Link support for latest firmware updates

Vendor Advisory: https://www.tp-link.com/us/support/download/

Restart Required: Yes

Instructions:

1. Visit TP-Link support site for your camera model. 2. Download latest firmware. 3. Log into camera web interface. 4. Navigate to System > Maintenance > Firmware Upgrade. 5. Upload firmware file. 6. Wait for reboot.

🔧 Temporary Workarounds

Network Isolation

all

Place cameras on isolated VLAN without internet access

Disable Cloud Features

all

Turn off cloud connectivity and use local-only access

🧯 If You Can't Patch

  • Disconnect cameras from internet entirely
  • Implement strict firewall rules to block all inbound/outbound camera traffic except from management stations

🔍 How to Verify

Check if Vulnerable:

Check firmware version in camera web interface under System > Status > Firmware Version

Check Version:

Check via web interface or TP-Link Tapo app under device information

Verify Fix Applied:

Verify firmware version is newer than affected versions listed above

📡 Detection & Monitoring

Log Indicators:

  • Unusual authentication attempts
  • Firmware version changes
  • Multiple failed decryption attempts

Network Indicators:

  • Unusual traffic patterns to/from camera IPs
  • Traffic using known hardcoded encryption patterns

SIEM Query:

source_ip IN (camera_ips) AND (event_type="authentication_failure" OR protocol="unknown_encryption")

🔗 References

📤 Share & Export