![]() ![]() An attacker could exploit this vulnerability to obtain sensitive information,” CISA said.Did You Know: It’s a race to the top for home security companies to see who can offer the fastest and easiest installation in the industry. “Owl Labs has released security updates to address a vulnerability (CVE-2022-31460) in Meeting Owl Pro and Whiteboard Owl. ![]() On Tuesday, the US Cybersecurity and Infrastructure Security Agency (CISA) encouraged Owl device owners to update to firmware version 5.4.1.4. This hardcoded passcode “is the SHA-1 has representation of the devices’ software serial, which is broadcasted as the name of the Owl over Bluetooth,” the researchers explain. The most severe of these issues, CVE-2022-31462, is the presence of a hardcoded backdoor passcode that “can be calculated from information that is visible in Bluetooth Low Energy proximity range.” The unresolved issues expose the device’s internal Switchboard (allowing an attacker to perform actions supported by the companion app), and allow for access to Bluetooth-exposed functionality without authentication and for the deactivation of the passcode without authentication. The Owl PIN issues are low risk and would allow someone to access per-meeting default-meeting settings only (for example: Presenter Enhance, 360-degree Pano on/off), and require them to be within Bluetooth range,” the company said. “To be clear, once software version 5.4.1.4 is applied, there is no risk of unauthorized network access due to the above CVEs. The company also notes that all devices should be protected against potential exploitation attempts once updated to 5.4.1.4. The remaining flaws, the company says, are expected to be resolved with future updates. On Monday, Owl Labs announced firmware version 5.4.1.4 for both Meeting Owl Pro and Whiteboard Owl, to disable “the passthrough of networking traffic in Wi-Fi AP tethering mode,” thus preventing the use of these devices as wireless access points. The vulnerability can be exploited without authentication. The issue exists because, when in AP mode, the device remains connected to the Wi-Fi network and routes all traffic to the network instead of allowing only connections to the Owl itself, Modzero explains. On Monday, Owl Labs announced the availability of patches for CVE-2022-31460, a high-severity bug that allows an attacker within Bluetooth range to turn the Meeting Owl device into a rogue access point to the owner’s network. The researchers discovered five vulnerabilities in Meeting Owl Pro: CVE-2022-31459, CVE-2022-31460, CVE-2022-31461 (CVSS score of 7.4), CVE-2022-31463 (CVSS score of 8.2), and CVE-2022-31462 (CVSS score of 9.3).Īll of these issues, the researchers say, are related to hardcoded credentials – Meeting Owl Pro creates its own Wi-Fi access point with the hardcoded passcode “hoothoot” – and impact the communication between the Meeting Owl Pro device and its companion application and backend server, as well as the web apps used for managing Meeting Owl devices. Security researchers with Modzero have identified multiple vulnerabilities in Owl’s devices, warning that they could be exploited to find registered devices worldwide and access sensitive data, or even gain access to the owners’ networks. It offers support for various video conferencing solutions, including Zoom, Skype, and Google Meet. Owl Labs’ Meeting Owl Pro features a 360° lens camera to offer a panoramic view of the conference room. Video conferencing company Owl Labs has released patches for a severe vulnerability affecting its Meeting Owl Pro and Whiteboard Owl devices.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |