CVE-2022-31462

Owl Labs Meeting Owl 5.2.0.15 allows attackers to control the device via a backdoor password (derived from the serial number) that can be found in Bluetooth broadcast data.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:owllabs:meeting_owl_pro_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:owllabs:meeting_owl_pro:-:*:*:*:*:*:*:*

History

08 Jul 2022, 16:47

Type Values Removed Values Added
References (MISC) https://resources.owllabs.com/blog/owl-labs-update - (MISC) https://resources.owllabs.com/blog/owl-labs-update - Release Notes, Vendor Advisory
CPE cpe:2.3:o:owllabs:meeting_owl_pro_firmware:5.2.0.15:*:*:*:*:*:*:* cpe:2.3:o:owllabs:meeting_owl_pro_firmware:*:*:*:*:*:*:*:*

07 Jul 2022, 12:15

Type Values Removed Values Added
References
  • (MISC) https://resources.owllabs.com/blog/owl-labs-update -

13 Jun 2022, 19:06

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : 5.4
v3 : 8.8
CPE cpe:2.3:h:owllabs:meeting_owl_pro:-:*:*:*:*:*:*:*
cpe:2.3:o:owllabs:meeting_owl_pro_firmware:5.2.0.15:*:*:*:*:*:*:*
CWE CWE-798
References (MISC) https://www.modzero.com/static/meetingowl/Meeting_Owl_Pro_Security_Disclosure_Report_RELEASE.pdf - (MISC) https://www.modzero.com/static/meetingowl/Meeting_Owl_Pro_Security_Disclosure_Report_RELEASE.pdf - Exploit, Third Party Advisory
References (MISC) https://arstechnica.com/information-technology/2022/06/vulnerabilities-in-meeting-owl-videoconference-device-imperil-100k-users/ - (MISC) https://arstechnica.com/information-technology/2022/06/vulnerabilities-in-meeting-owl-videoconference-device-imperil-100k-users/ - Third Party Advisory

02 Jun 2022, 22:15

Type Values Removed Values Added
New CVE

Information

Published : 2022-06-02 22:15

Updated : 2024-02-04 22:29


NVD link : CVE-2022-31462

Mitre link : CVE-2022-31462

CVE.ORG link : CVE-2022-31462


JSON object : View

Products Affected

owllabs

  • meeting_owl_pro
  • meeting_owl_pro_firmware
CWE
CWE-798

Use of Hard-coded Credentials