Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-45181 | Snap One OVRC cloud uses the MAC address as an identifier to provide information when requested. An attacker can impersonate other devices by supplying enumerated MAC addresses and receive sensitive information about the device. |
Solution
Snap One has released the following updates/fixes for the affected products: * OvrC Pro v7.2 has been automatically pushed out to devices to update via OvrC cloud. * OvrC Pro v7.3 has been automatically pushed out to devices to update via OvrC cloud. * Disable UPnP. For more information, see Snap One’s Release Notes https://www.control4.com/docs/product/ovrc-software/release-notes/english/latest/ovrc-software-release-notes-rev-p.pdf .
Workaround
No workaround given by the vendor.
Mon, 02 Dec 2024 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Snapone
Snapone orvc |
|
| CPEs | cpe:2.3:a:snapone:orvc:-:*:*:*:*:pro:*:* | |
| Vendors & Products |
Snapone
Snapone orvc |
|
| Metrics |
ssvc
|
Mon, 02 Dec 2024 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Snap One OVRC cloud uses the MAC address as an identifier to provide information when requested. An attacker can impersonate other devices by supplying enumerated MAC addresses and receive sensitive information about the device. | |
| Title | Authentication Bypass by Spoofing in Snap One OVRC cloud | |
| Weaknesses | CWE-290 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2024-12-02T18:30:33.246Z
Reserved: 2024-10-23T15:31:57.810Z
Link: CVE-2024-50380
Updated: 2024-12-02T18:30:27.183Z
Status : Received
Published: 2024-12-02T17:15:11.980
Modified: 2024-12-02T17:15:11.980
Link: CVE-2024-50380
No data.
OpenCVE Enrichment
No data.
EUVD