First published: Thu Jun 02 2022(Updated: )
Owl Labs Meeting Owl contains an improper authentication vulnerability that does not require a password for Bluetooth commands, as only client-side authentication is used.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Owl Labs Meeting Owl | ||
Owllabs Meeting Owl Pro Firmware | <5.4.2.3 | |
Owllabs Meeting Owl Pro Firmware |
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-31463 is an improper authentication vulnerability in Owl Labs Meeting Owl.
CVE-2022-31463 allows unauthorized access to Owl Labs Meeting Owl through Bluetooth commands without needing a password.
No, Owl Labs Meeting Owl does not require a password for Bluetooth commands, which can pose a security risk.
Owl Labs Meeting Owl only uses client-side authentication, which is insufficient for securing Bluetooth commands.
To fix the improper authentication vulnerability in Owl Labs Meeting Owl, it is recommended to install the latest firmware or software updates provided by the vendor.