CVE-2022-31460

Owl Labs Meeting Owl 5.2.0.15 allows attackers to activate Tethering Mode with hard-coded hoothoot credentials via a certain c 150 value.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:owllabs:meeting_owl_pro_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:owllabs:meeting_owl_pro:-:*:*:*:*:*:*:*

History

21 Nov 2024, 07:04

Type Values Removed Values Added
References () https://arstechnica.com/information-technology/2022/06/vulnerabilities-in-meeting-owl-videoconference-device-imperil-100k-users/ - Third Party Advisory () https://arstechnica.com/information-technology/2022/06/vulnerabilities-in-meeting-owl-videoconference-device-imperil-100k-users/ - Third Party Advisory
References () https://resources.owllabs.com/blog/owl-labs-update - Release Notes, Vendor Advisory () https://resources.owllabs.com/blog/owl-labs-update - Release Notes, Vendor Advisory
References () https://www.modzero.com/static/meetingowl/Meeting_Owl_Pro_Security_Disclosure_Report_RELEASE.pdf - Exploit, Third Party Advisory () https://www.modzero.com/static/meetingowl/Meeting_Owl_Pro_Security_Disclosure_Report_RELEASE.pdf - Exploit, Third Party Advisory

Information

Published : 2022-06-02 22:15

Updated : 2024-11-21 07:04


NVD link : CVE-2022-31460

Mitre link : CVE-2022-31460

CVE.ORG link : CVE-2022-31460


JSON object : View

Products Affected

owllabs

  • meeting_owl_pro_firmware
  • meeting_owl_pro
CWE
CWE-798

Use of Hard-coded Credentials