First published: Thu Jun 02 2022(Updated: )
Owl Labs Meeting Owl contains a use of hard-coded credentials vulnerability that allows an attacker to control the device via a backdoor password (derived from the serial number) that can be found in Bluetooth broadcast data.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Owl Labs Meeting Owl | ||
Owllabs Meeting Owl Pro Firmware | <5.4.2.3 | |
Owllabs Meeting Owl Pro |
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for the Owl Labs Meeting Owl use of hard-coded credentials vulnerability is CVE-2022-31462.
The vulnerability allows an attacker to control the device via a backdoor password derived from the serial number, which is found in Bluetooth broadcast data.
An attacker can exploit the vulnerability by using the backdoor password derived from the serial number to gain unauthorized control over the device.
Yes, a fix for the vulnerability should be provided by Owl Labs. Please refer to the vendor's official update for more information.
You can find more information about the vulnerability in the official update provided by Owl Labs.