CVE-2022-40187

Foresight GC3 Launch Monitor 1.3.15.68 ships with a Target Communication Framework (TCF) service enabled. This service listens on a TCP port on all interfaces and allows for process debugging, file system modification, and terminal access as the root user. In conjunction with a hosted wireless access point and the known passphrase of FSSPORTS, an attacker could use this service to modify a device and steal intellectual property.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:foresightsports:gc3_launch_monitor_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:foresightsports:gc3_launch_monitor:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:bushnellgolf:launch_pro_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:bushnellgolf:launch_pro:-:*:*:*:*:*:*:*

History

No history.

Information

Published : 2022-10-13 01:15

Updated : 2024-02-28 19:29


NVD link : CVE-2022-40187

Mitre link : CVE-2022-40187

CVE.ORG link : CVE-2022-40187


JSON object : View

Products Affected

bushnellgolf

  • launch_pro_firmware
  • launch_pro

foresightsports

  • gc3_launch_monitor
  • gc3_launch_monitor_firmware
CWE
CWE-276

Incorrect Default Permissions