When supplied with a random MAC address, Snap One OvrC cloud servers will return information about the device. The MAC address of devices can be enumerated in an attack and the OvrC cloud will disclose their information.
References
Link | Resource |
---|---|
https://www.cisa.gov/news-events/ics-advisories/icsa-23-136-01 | Third Party Advisory US Government Resource |
https://www.control4.com/docs/product/ovrc-software/release-notes/english/latest/ovrc-software-release-notes-rev-r.pdf | Release Notes |
https://www.cisa.gov/news-events/ics-advisories/icsa-23-136-01 | Third Party Advisory US Government Resource |
https://www.control4.com/docs/product/ovrc-software/release-notes/english/latest/ovrc-software-release-notes-rev-r.pdf | Release Notes |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 07:55
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.cisa.gov/news-events/ics-advisories/icsa-23-136-01 - Third Party Advisory, US Government Resource | |
References | () https://www.control4.com/docs/product/ovrc-software/release-notes/english/latest/ovrc-software-release-notes-rev-r.pdf - Release Notes |
30 May 2023, 15:59
Type | Values Removed | Values Added |
---|---|---|
First Time |
Snapone pakedge Rt-3100
Snapone pakedge Wr-1 Control4 ca-1 Control4 ca-10 Control4 Control4 ea-3 Snapone an-110-rt-2l1w Snapone orvc Snapone Control4 ea-5 Snapone pakedge Rk-1 Snapone ovrc-300-pro Snapone an-110-rt-2l1w-wifi Snapone an-310-rt-4l2w Control4 ea-1 |
|
References | (MISC) https://www.control4.com/docs/product/ovrc-software/release-notes/english/latest/ovrc-software-release-notes-rev-r.pdf - Release Notes | |
References | (MISC) https://www.cisa.gov/news-events/ics-advisories/icsa-23-136-01 - Third Party Advisory, US Government Resource | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.3 |
CWE | CWE-203 | |
CPE | cpe:2.3:h:snapone:pakedge_rk-1:-:*:*:*:*:*:*:* cpe:2.3:h:snapone:an-110-rt-2l1w:-:*:*:*:*:*:*:* cpe:2.3:h:control4:ea-1:-:*:*:*:*:*:*:* cpe:2.3:h:control4:ca-1:-:*:*:*:*:*:*:* cpe:2.3:h:snapone:an-110-rt-2l1w-wifi:-:*:*:*:*:*:*:* cpe:2.3:h:control4:ca-10:-:*:*:*:*:*:*:* cpe:2.3:h:snapone:ovrc-300-pro:-:*:*:*:*:*:*:* cpe:2.3:h:snapone:pakedge_rt-3100:-:*:*:*:*:*:*:* cpe:2.3:h:control4:ea-3:-:*:*:*:*:*:*:* cpe:2.3:h:control4:ea-5:-:*:*:*:*:*:*:* cpe:2.3:h:snapone:an-310-rt-4l2w:-:*:*:*:*:*:*:* cpe:2.3:h:snapone:pakedge_wr-1:-:*:*:*:*:*:*:* cpe:2.3:a:snapone:orvc:*:*:*:*:*:pro:*:* |
Information
Published : 2023-05-22 20:15
Updated : 2024-11-21 07:55
NVD link : CVE-2023-28412
Mitre link : CVE-2023-28412
CVE.ORG link : CVE-2023-28412
JSON object : View
Products Affected
snapone
- pakedge_rt-3100
- pakedge_wr-1
- pakedge_rk-1
- an-110-rt-2l1w-wifi
- orvc
- an-110-rt-2l1w
- an-310-rt-4l2w
- ovrc-300-pro
control4
- ca-10
- ea-5
- ea-3
- ea-1
- ca-1