Snap One OVRC cloud uses the MAC address as an identifier to provide information when requested. An attacker can impersonate other devices by supplying enumerated MAC addresses and receive sensitive information about the device.
Advisories
Source ID Title
EUVD EUVD EUVD-2024-45181 Snap One OVRC cloud uses the MAC address as an identifier to provide information when requested. An attacker can impersonate other devices by supplying enumerated MAC addresses and receive sensitive information about the device.
Fixes

Solution

Snap One has released the following updates/fixes for the affected products: * OvrC Pro v7.2 has been automatically pushed out to devices to update via OvrC cloud. * OvrC Pro v7.3 has been automatically pushed out to devices to update via OvrC cloud. * Disable UPnP. For more information, see Snap One’s Release Notes https://www.control4.com/docs/product/ovrc-software/release-notes/english/latest/ovrc-software-release-notes-rev-p.pdf .


Workaround

No workaround given by the vendor.

History

Mon, 02 Dec 2024 19:15:00 +0000

Type Values Removed Values Added
First Time appeared Snapone
Snapone orvc
CPEs cpe:2.3:a:snapone:orvc:-:*:*:*:*:pro:*:*
Vendors & Products Snapone
Snapone orvc
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 02 Dec 2024 16:45:00 +0000

Type Values Removed Values Added
Description Snap One OVRC cloud uses the MAC address as an identifier to provide information when requested. An attacker can impersonate other devices by supplying enumerated MAC addresses and receive sensitive information about the device.
Title Authentication Bypass by Spoofing in Snap One OVRC cloud
Weaknesses CWE-290
References
Metrics cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2024-12-02T18:30:33.246Z

Reserved: 2024-10-23T15:31:57.810Z

Link: CVE-2024-50380

cve-icon Vulnrichment

Updated: 2024-12-02T18:30:27.183Z

cve-icon NVD

Status : Received

Published: 2024-12-02T17:15:11.980

Modified: 2024-12-02T17:15:11.980

Link: CVE-2024-50380

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.