The Chirp Access app contains a hard-coded password, BEACON_PASSWORD. An attacker within Bluetooth range could change configuration settings within the Bluetooth beacon, effectively disabling the application's ability to notify users when they are near a Beacon-enabled access point. This variable cannot be used to change the configuration settings of the door readers or locksets and does not affect the ability for authorized users of the mobile application to lock or unlock access points.
Advisories
Source ID Title
EUVD EUVD EUVD-2024-27157 The Chirp Access app contains a hard-coded password, BEACON_PASSWORD. An attacker within Bluetooth range could change configuration settings within the Bluetooth beacon, effectively disabling the application's ability to notify users when they are near a Beacon-enabled access point. This variable cannot be used to change the configuration settings of the door readers or locksets and does not affect the ability for authorized users of the mobile application to lock or unlock access points.
Fixes

Solution

Update to v1.26.0


Workaround

For additional information, please see Chirp Systems statement here https://statement.chirpsystems.com/chirp-systems-icsa-24-067-01-response.html  or contact RealPage (Chirp Systems' parent company) via their support page https://www.realpage.com/support/ .

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2024-08-01T19:03:39.092Z

Reserved: 2024-03-05T17:22:25.096Z

Link: CVE-2024-2197

cve-icon Vulnrichment

Updated: 2024-08-01T19:03:39.092Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-03-20T01:15:11.823

Modified: 2024-11-21T09:09:14.310

Link: CVE-2024-2197

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.