Owl Labs Meeting Owl 5.2.0.15 allows attackers to control the device via a backdoor password (derived from the serial number) that can be found in Bluetooth broadcast data.
References
Link | Resource |
---|---|
https://arstechnica.com/information-technology/2022/06/vulnerabilities-in-meeting-owl-videoconference-device-imperil-100k-users/ | Third Party Advisory |
https://resources.owllabs.com/blog/owl-labs-update | Release Notes Vendor Advisory |
https://www.modzero.com/static/meetingowl/Meeting_Owl_Pro_Security_Disclosure_Report_RELEASE.pdf | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
No history.
Information
Published : 2022-06-02 22:15
Updated : 2022-07-08 16:47
NVD link : CVE-2022-31462
Mitre link : CVE-2022-31462
CVE.ORG link : CVE-2022-31462
JSON object : View
Products Affected
owllabs
- meeting_owl_pro
- meeting_owl_pro_firmware
CWE
CWE-798
Use of Hard-coded Credentials