Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-35556 | Snap One OvrC cloud servers contain a route an attacker can use to bypass requirements and claim devices outright. |
Solution
Snap One has released the following updates/fixes for the affected products: * OvrC Pro v7.2 has been automatically pushed out to devices to update via OvrC cloud. * OvrC Pro v7.3 has been automatically pushed out to devices to update via OvrC cloud. * Disable UPnP. For more information, see Snap One’s Release Notes https://www.control4.com/docs/product/ovrc-software/release-notes/english/latest/ovrc-software-release-notes-rev-p.pdf .
Workaround
No workaround given by the vendor.
Thu, 16 Jan 2025 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 09 Dec 2024 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-284 |
Mon, 09 Dec 2024 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Snap One OvrC cloud servers contain a route an attacker can use to bypass requirements and claim devices outright. | Snap One OvrC cloud servers contain a route an attacker can use to bypass requirements and claim devices outright. |
| Weaknesses | CWE-420 |
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2025-01-16T21:33:49.710Z
Reserved: 2023-04-26T19:18:23.286Z
Link: CVE-2023-31241
Updated: 2024-08-02T14:53:30.880Z
Status : Modified
Published: 2023-05-22T20:15:10.720
Modified: 2024-12-09T18:15:21.090
Link: CVE-2023-31241
No data.
OpenCVE Enrichment
No data.
EUVD