CVE-2022-31462

Owl Labs Meeting Owl 5.2.0.15 allows attackers to control the device via a backdoor password (derived from the serial number) that can be found in Bluetooth broadcast data.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:owllabs:meeting_owl_pro_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:owllabs:meeting_owl_pro:-:*:*:*:*:*:*:*

History

21 Nov 2024, 07:04

Type Values Removed Values Added
CVSS v2 : 5.4
v3 : 8.8
v2 : 5.4
v3 : 9.3
References () https://arstechnica.com/information-technology/2022/06/vulnerabilities-in-meeting-owl-videoconference-device-imperil-100k-users/ - Third Party Advisory () https://arstechnica.com/information-technology/2022/06/vulnerabilities-in-meeting-owl-videoconference-device-imperil-100k-users/ - Third Party Advisory
References () https://resources.owllabs.com/blog/owl-labs-update - Release Notes, Vendor Advisory () https://resources.owllabs.com/blog/owl-labs-update - Release Notes, Vendor Advisory
References () https://www.modzero.com/static/meetingowl/Meeting_Owl_Pro_Security_Disclosure_Report_RELEASE.pdf - Exploit, Third Party Advisory () https://www.modzero.com/static/meetingowl/Meeting_Owl_Pro_Security_Disclosure_Report_RELEASE.pdf - Exploit, Third Party Advisory

08 Jul 2022, 16:47

Type Values Removed Values Added
CPE cpe:2.3:o:owllabs:meeting_owl_pro_firmware:5.2.0.15:*:*:*:*:*:*:* cpe:2.3:o:owllabs:meeting_owl_pro_firmware:*:*:*:*:*:*:*:*
References (MISC) https://resources.owllabs.com/blog/owl-labs-update - (MISC) https://resources.owllabs.com/blog/owl-labs-update - Release Notes, Vendor Advisory

07 Jul 2022, 12:15

Type Values Removed Values Added
References
  • (MISC) https://resources.owllabs.com/blog/owl-labs-update -

13 Jun 2022, 19:06

Type Values Removed Values Added
CPE cpe:2.3:h:owllabs:meeting_owl_pro:-:*:*:*:*:*:*:*
cpe:2.3:o:owllabs:meeting_owl_pro_firmware:5.2.0.15:*:*:*:*:*:*:*
CWE CWE-798
References (MISC) https://www.modzero.com/static/meetingowl/Meeting_Owl_Pro_Security_Disclosure_Report_RELEASE.pdf - (MISC) https://www.modzero.com/static/meetingowl/Meeting_Owl_Pro_Security_Disclosure_Report_RELEASE.pdf - Exploit, Third Party Advisory
References (MISC) https://arstechnica.com/information-technology/2022/06/vulnerabilities-in-meeting-owl-videoconference-device-imperil-100k-users/ - (MISC) https://arstechnica.com/information-technology/2022/06/vulnerabilities-in-meeting-owl-videoconference-device-imperil-100k-users/ - Third Party Advisory
CVSS v2 : unknown
v3 : unknown
v2 : 5.4
v3 : 8.8

02 Jun 2022, 22:15

Type Values Removed Values Added
New CVE

Information

Published : 2022-06-02 22:15

Updated : 2024-11-21 07:04


NVD link : CVE-2022-31462

Mitre link : CVE-2022-31462

CVE.ORG link : CVE-2022-31462


JSON object : View

Products Affected

owllabs

  • meeting_owl_pro_firmware
  • meeting_owl_pro
CWE
CWE-798

Use of Hard-coded Credentials