7.4
CVE-2022-31460
- EPSS 6.17%
- Veröffentlicht 02.06.2022 22:15:08
- Zuletzt bearbeitet 21.11.2024 07:04:29
- Quelle cve@mitre.org
- CVE-Watchlists
- Unerledigt
Owl Labs Meeting Owl 5.2.0.15 allows attackers to activate Tethering Mode with hard-coded hoothoot credentials via a certain c 150 value.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Owllabs ≫ Meeting Owl Pro Firmware Version < 5.4.2.3
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 6.17% | 0.905 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 7.4 | 2.8 | 4 |
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N
|
| nvd@nist.gov | 3.3 | 6.5 | 2.9 |
AV:A/AC:L/Au:N/C:N/I:P/A:N
|
| cve@mitre.org | 7.4 | 2.8 | 4 |
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N
|
CWE-798 Use of Hard-coded Credentials
The product contains hard-coded credentials, such as a password or cryptographic key.