First published: Thu Jun 02 2022(Updated: )
Owl Labs Meeting Owl 5.2.0.15 allows attackers to retrieve the passcode hash via a certain c 10 value over Bluetooth.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Owllabs Meeting Owl Pro Firmware | <5.4.2.3 | |
Owllabs Meeting Owl Pro | ||
Owl Labs Meeting Owl |
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The CVE ID for this vulnerability is CVE-2022-31459.
The title of this vulnerability is Owl Labs Meeting Owl Inadequate Encryption Strength Vulnerability.
The affected software includes Owllabs Meeting Owl Pro Firmware version up to 5.4.2.3 and Owllabs Meeting Owl.
The severity of this vulnerability is high with a CVSS score of 6.5.
This vulnerability allows an attacker to retrieve the passcode hash via a certain c 10 value over Bluetooth.
To fix this vulnerability, it is recommended to update Owllabs Meeting Owl Pro Firmware to a version above 5.4.2.3.
No, only the version up to 5.4.2.3 of Owllabs Meeting Owl Pro Firmware is affected by this vulnerability.
More information about this vulnerability can be found in the references provided: [link1], [link2], [link3].