Snap One OvrC cloud servers contain a route an attacker can use to bypass requirements and claim devices outright.
Fixes

Solution

Snap One has released the following updates/fixes for the affected products: * OvrC Pro v7.2 has been automatically pushed out to devices to update via OvrC cloud. * OvrC Pro v7.3 has been automatically pushed out to devices to update via OvrC cloud. * Disable UPnP. For more information, see Snap One’s Release Notes https://www.control4.com/docs/product/ovrc-software/release-notes/english/latest/ovrc-software-release-notes-rev-p.pdf .


Workaround

No workaround given by the vendor.

History

Thu, 16 Jan 2025 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 09 Dec 2024 18:45:00 +0000

Type Values Removed Values Added
Weaknesses CWE-284

Mon, 09 Dec 2024 17:45:00 +0000

Type Values Removed Values Added
Description Snap One OvrC cloud servers contain a route an attacker can use to bypass requirements and claim devices outright. Snap One OvrC cloud servers contain a route an attacker can use to bypass requirements and claim devices outright.
Weaknesses CWE-420

cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2025-01-16T21:33:49.710Z

Reserved: 2023-04-26T19:18:23.286Z

Link: CVE-2023-31241

cve-icon Vulnrichment

Updated: 2024-08-02T14:53:30.880Z

cve-icon NVD

Status : Modified

Published: 2023-05-22T20:15:10.720

Modified: 2024-12-09T18:15:21.090

Link: CVE-2023-31241

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.