The Chirp Access app contains a hard-coded password, BEACON_PASSWORD. An attacker within Bluetooth range could change configuration settings within the Bluetooth beacon, effectively disabling the application's ability to notify users when they are near a Beacon-enabled access point. This variable cannot be used to change the configuration settings of the door readers or locksets and does not affect the ability for authorized users of the mobile application to lock or unlock access points.
References
Configurations
No configuration.
History
21 Nov 2024, 09:09
Type | Values Removed | Values Added |
---|---|---|
References | () https://statement.chirpsystems.com/chirp-systems-icsa-24-067-01-response.html - | |
References | () https://www.cisa.gov/news-events/ics-advisories/icsa-24-067-01 - | |
Summary |
|
05 Jun 2024, 23:15
Type | Values Removed | Values Added |
---|---|---|
Summary | (en) The Chirp Access app contains a hard-coded password, BEACON_PASSWORD. An attacker within Bluetooth range could change configuration settings within the Bluetooth beacon, effectively disabling the application's ability to notify users when they are near a Beacon-enabled access point. This variable cannot be used to change the configuration settings of the door readers or locksets and does not affect the ability for authorized users of the mobile application to lock or unlock access points. | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 4.3 |
References |
|
|
CWE | CWE-259 |
20 Mar 2024, 13:00
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-03-20 01:15
Updated : 2024-11-21 09:09
NVD link : CVE-2024-2197
Mitre link : CVE-2024-2197
CVE.ORG link : CVE-2024-2197
JSON object : View
Products Affected
No product.
CWE
CWE-259
Use of Hard-coded Password