CVE-2024-2197

The Chirp Access app contains a hard-coded password, BEACON_PASSWORD. An attacker within Bluetooth range could change configuration settings within the Bluetooth beacon, effectively disabling the application's ability to notify users when they are near a Beacon-enabled access point. This variable cannot be used to change the configuration settings of the door readers or locksets and does not affect the ability for authorized users of the mobile application to lock or unlock access points.
Configurations

No configuration.

History

05 Jun 2024, 23:15

Type Values Removed Values Added
CWE CWE-798 CWE-259
References
  • () https://statement.chirpsystems.com/chirp-systems-icsa-24-067-01-response.html -
Summary (en) Chirp Access improperly stores credentials within its source code, potentially exposing sensitive information to unauthorized access. (en) The Chirp Access app contains a hard-coded password, BEACON_PASSWORD. An attacker within Bluetooth range could change configuration settings within the Bluetooth beacon, effectively disabling the application's ability to notify users when they are near a Beacon-enabled access point. This variable cannot be used to change the configuration settings of the door readers or locksets and does not affect the ability for authorized users of the mobile application to lock or unlock access points.
CVSS v2 : unknown
v3 : 9.1
v2 : unknown
v3 : 4.3

20 Mar 2024, 13:00

Type Values Removed Values Added
New CVE

Information

Published : 2024-03-20 01:15

Updated : 2024-06-05 23:15


NVD link : CVE-2024-2197

Mitre link : CVE-2024-2197

CVE.ORG link : CVE-2024-2197


JSON object : View

Products Affected

No product.

CWE
CWE-259

Use of Hard-coded Password