First published: Thu Jun 02 2022(Updated: )
Owl Labs Meeting Owl and Whiteboard Owl allow attackers to activate Tethering Mode with hard-coded hoothoot credentials via a certain c 150 value.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Owl Labs Meeting Owl Pro and Whiteboard Owl | ||
Owllabs Meeting Owl Pro Firmware | <5.4.2.3 | |
Owllabs Meeting Owl Pro |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-31460 is a vulnerability found in Owl Labs Meeting Owl Pro and Whiteboard Owl devices that allows attackers to activate Tethering Mode using hard-coded hoothoot credentials.
The CVE-2022-31460 vulnerability allows attackers to activate Tethering Mode on Meeting Owl Pro and Whiteboard Owl devices by using specific credentials.
CVE-2022-31460 has a severity rating of 7.4 (high).
To fix the CVE-2022-31460 vulnerability, make sure to update the Meeting Owl Pro firmware to version 5.4.2.3 or newer.
You can find more information about CVE-2022-31460 in the references provided: 1. [Ars Technica](https://arstechnica.com/information-technology/2022/06/vulnerabilities-in-meeting-owl-videoconference-device-imperil-100k-users/) 2. [Owl Labs Blog](https://resources.owllabs.com/blog/owl-labs-update) 3. [Modzero Security Disclosure Report](https://www.modzero.com/static/meetingowl/Meeting_Owl_Pro_Security_Disclosure_Report_RELEASE.pdf)