Owl Labs Meeting Owl 5.2.0.15 allows attackers to activate Tethering Mode with hard-coded hoothoot credentials via a certain c 150 value.
                
            References
                    | Link | Resource | 
|---|---|
| https://www.modzero.com/static/meetingowl/Meeting_Owl_Pro_Security_Disclosure_Report_RELEASE.pdf | Exploit Third Party Advisory | 
| https://arstechnica.com/information-technology/2022/06/vulnerabilities-in-meeting-owl-videoconference-device-imperil-100k-users/ | Third Party Advisory | 
| https://resources.owllabs.com/blog/owl-labs-update | Release Notes Vendor Advisory | 
Configurations
                    Configuration 1 (hide)
| AND | 
                                
                                
 
  | 
                        
Information
                Published : 2022-06-02 15:15
Updated : 2022-07-08 09:49
NVD link : CVE-2022-31460
Mitre link : CVE-2022-31460
JSON object : View
CWE
                
                    
                        
                        CWE-798
                        
            Use of Hard-coded Credentials
Products Affected
                owllabs
- meeting_owl_pro
 - meeting_owl_pro_firmware
 


