Description
The Chirp Access app contains a hard-coded password, BEACON_PASSWORD. An attacker within Bluetooth range could change configuration settings within the Bluetooth beacon, effectively disabling the application's ability to notify users when they are near a Beacon-enabled access point. This variable cannot be used to change the configuration settings of the door readers or locksets and does not affect the ability for authorized users of the mobile application to lock or unlock access points.
Published: 2024-03-19
Score: 2.3 Low
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

Vendor Solution

Update to v1.26.0


Vendor Workaround

For additional information, please see Chirp Systems statement here https://statement.chirpsystems.com/chirp-systems-icsa-24-067-01-response.html  or contact RealPage (Chirp Systems' parent company) via their support page https://www.realpage.com/support/ .

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2024-27157 The Chirp Access app contains a hard-coded password, BEACON_PASSWORD. An attacker within Bluetooth range could change configuration settings within the Bluetooth beacon, effectively disabling the application's ability to notify users when they are near a Beacon-enabled access point. This variable cannot be used to change the configuration settings of the door readers or locksets and does not affect the ability for authorized users of the mobile application to lock or unlock access points.
History

No history.

Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2024-08-01T19:03:39.092Z

Reserved: 2024-03-05T17:22:25.096Z

Link: CVE-2024-2197

cve-icon Vulnrichment

Updated: 2024-08-01T19:03:39.092Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-03-20T01:15:11.823

Modified: 2024-11-21T09:09:14.310

Link: CVE-2024-2197

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses