The Chirp Access app contains a hard-coded password, BEACON_PASSWORD. An attacker within Bluetooth range could change configuration settings within the Bluetooth beacon, effectively disabling the application's ability to notify users when they are near a Beacon-enabled access point. This variable cannot be used to change the configuration settings of the door readers or locksets and does not affect the ability for authorized users of the mobile application to lock or unlock access points.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-27157 | The Chirp Access app contains a hard-coded password, BEACON_PASSWORD. An attacker within Bluetooth range could change configuration settings within the Bluetooth beacon, effectively disabling the application's ability to notify users when they are near a Beacon-enabled access point. This variable cannot be used to change the configuration settings of the door readers or locksets and does not affect the ability for authorized users of the mobile application to lock or unlock access points. |
Fixes
Solution
Update to v1.26.0
Workaround
For additional information, please see Chirp Systems statement here https://statement.chirpsystems.com/chirp-systems-icsa-24-067-01-response.html or contact RealPage (Chirp Systems' parent company) via their support page https://www.realpage.com/support/ .
References
History
No history.
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2024-08-01T19:03:39.092Z
Reserved: 2024-03-05T17:22:25.096Z
Link: CVE-2024-2197
Updated: 2024-08-01T19:03:39.092Z
Status : Awaiting Analysis
Published: 2024-03-20T01:15:11.823
Modified: 2024-11-21T09:09:14.310
Link: CVE-2024-2197
No data.
OpenCVE Enrichment
No data.
EUVD